DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The Cyber Intelligence Analyst’s Cookbook

Posted on March 16, 2020 by Dissent

There’s a new — and free — OSINT resource from Open Source Researchers that I want to let you all know about:

The Cyber Intelligence Analyst’s Cookbook
Volume 1 : A primer for Open Source Intelligence Collection and Applied Research

An excerpt from the Preface:

Anyways, I started with this brain dump of my process for recording OSINT. The work initially started out just for me. I haven’t documented any of my methods, thoughts, what have you in quite some time. I was due for this knowledge transfer. However, as I began writing, I found that a manual wasn’t going to cut it. The next thing I know, I’m writing a book, and thirty days-ish later, the first draft was completed. Truthfully, it’s an awful book, and I apologize to anyone who attempts to read it. Yet, as I look back over the body of knowledge, I see that I’ve at least created a good foundation for future volumes. Opportunities for expansion and clarification. Who knows, maybe someone will find what’s in this book useful.

The book itself is explicitly written for cyber intelligence analysts. Still, anyone who performs intelligence as a discipline can deconstruct what’s here and apply it to any intelligence domain. I’m also assuming the reader, at a minimum, has access to the Internet and can look up the tools used within the book. I’ve tried my best to add references to the right level of detail and completeness. I do believe in citing sources. Well, I’ve been beaten into always citing sources through my academic career as a student. So, what exactly is in this book? Part 1 of this book goes over the way I collect and store OSINT into MISP. Part 2 goes over some higher-order analysis that can be applied to the data.

You can download the 3.8 MB pdf file here.

Great thanks to the reader who let me know about this and the Open Source Research Society for making it available. 

 


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • More than 100 British government personnel exposed by Ministry of Defence data leak
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Ministry of Defence data breach timeline
Category: Of NoteUncategorized

Post navigation

← PXJ Ransomware Campaign Identified by X-Force IRIS
Coronavirus: Cybercriminals target healthcare workers with email scam →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks
  • Bank of America Refused To Reimburse Georgia Customer After Hackers Hit Account. Then a News Station Showed Up.
  • NCERT Issues Advisory on “Blue Locker” Ransomware Targeting Pakistan’s Key Institutions
  • Scattered Spider has a new Telegram channel to list its attacks
  • SC: Spartanburg County hit by cyberattack, some online services disrupted
  • Pakistan Petroleum thwarts ransomware attempt, says no critical data compromised
  • ShinyHunters sent Google an extortion demand; Shiny comments on current activities
  • Air France and KLM alert customers to data breach on external platform
  • Samourai CEO Keonne Rodriguez and Samourai CTO William Lonergan Hill Pled Guilty to Operating a Money Transmitting Business, Samourai Wallet, That Transmitted Over $200 Million in Criminal Proceeds
  • 6.4 million Bouygues Telecom just had their data exposed in a huge data breach – and it’s the second to hit French telecoms operators in a month

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.