{"id":196154,"date":"2024-10-15T03:52:09","date_gmt":"2024-10-15T02:52:09","guid":{"rendered":"https:\/\/liora.io\/en\/?p=196154"},"modified":"2026-02-12T17:20:12","modified_gmt":"2026-02-12T16:20:12","slug":"all-about-osint","status":"publish","type":"post","link":"https:\/\/liora.io\/en\/all-about-osint","title":{"rendered":"OSINT (Open Source Intelligence): What is it? Who can use it?"},"content":{"rendered":"\n<p><b>OSINT, or open source intelligence, is revolutionizing the norms of cybersecurity. By utilizing publicly accessible information, it allows for threat anticipation, conducting investigations, and protecting organizations without breaking the law. Discover how OSINT operates, what tools to use, and why this discipline is becoming indispensable in cybersecurity professions.<\/b><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-osint\">What is OSINT?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-definition-de-l-open-source-intelligence\">D\u00e9finition de l\u2019Open Source Intelligence<\/h3>\n\n\n\n<p><b>OSINT<\/b>, or <i>Open Source Intelligence<\/i>, refers to the <b>collection and analysis of public information<\/b>. This encompasses social media, websites, forums, and even <a href=\"https:\/\/liora.io\/en\/database-what-is-it\">publicly accessible databases<\/a>. Traditionally, this approach can be traced back to military intelligence services, which already exploited media to detect weak signals. Today, in the digital era, anyone can engage in it. OSINT is one of the most insightful and ethical ways to access an abundance of information without ever breaching the law.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-osint-vs-traditional-intelligence-how-do-they-differ\">OSINT vs. Traditional Intelligence: How do they differ?<\/h3>\n\n\n\n<p><b>Traditional intelligence<\/b> relies on confidential, sometimes intrusive, or even unlawful methods. In contrast, OSINT is restricted to what is <b>visibly accessible<\/b>.<\/p>\n\n\n\n<p>This distinction is what makes OSINT so potent. It involves remaining lawful while utilizing <b>often underestimated data<\/b>. However, diligence is crucial: not everything is necessarily trustworthy, even if it is public.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-is-osint-legal\">Is OSINT legal?<\/h3>\n\n\n\n<p>Absolutely. As long as it involves <b>data accessible without hacking<\/b>, we remain within the legal framework. This includes, of course, the GDPR in Europe, which protects personal data.<\/p>\n\n\n\n<p>However, legality isn&#8217;t always sufficient. We believe it is essential to adopt an <b>ethical approach<\/b>: if data is sensitive, even if publicly available, is it truly worth exploiting?<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2025\/05\/ChatGPT-Image-8-avr.-2025-14_27_10-1024x683.png\" alt=\"\" \/><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/liora.io\/en\/courses\/data-ai\/\">Learn to use OSINT<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-the-use-of-osint-today\">What is the use of OSINT today?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-osint-in-cybersecurity\">OSINT in Cybersecurity<\/h3>\n\n\n\n<p>In <a href=\"https:\/\/liora.io\/en\/cybersecurity-the-ultimate-guide\">cybersecurity<\/a>, OSINT is a formidable ally. It enables <b>identifying visible vulnerabilities<\/b>, analyzing information mistakenly exposed (such as emails or open ports), and mapping threats before they materialize. We regard it as an essential strategy in any defense plan: proactive, lawful, and often underestimated.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-osint-in-people-search-investigations\">OSINT in People Search Investigations<\/h3>\n\n\n\n<p>Are you trying to <b>find someone<\/b>, verify an identity, or cross-reference information? OSINT can assist you by utilizing digital traces left voluntarily (or not) on the web. In this context, every detail matters: an email address, a username, a photo&#8230; If you know where to search, you can often <b>trace back the connection<\/b>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-osint-for-companies-and-institutions\">OSINT for Companies and Institutions<\/h3>\n\n\n\n<p>Organizations can greatly benefit from integrating OSINT into their <a href=\"https:\/\/liora.io\/en\/what-is-technology-watch\">strategic monitoring<\/a>. It allows them to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>monitor their <b>e-reputation<\/b>,<\/li>\n\n\n\n<li>detect <b>weak signals<\/b> related to competitors,<\/li>\n\n\n\n<li>prevent <b>social engineering<\/b> attacks.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-osint-and-hacking-misusing-public-data\">OSINT and Hacking: Misusing Public Data<\/h3>\n\n\n\n<p>Sadly, <b>hackers also utilize OSINT<\/b>. They use it to customize attacks, identify susceptible targets, or craft more believable scams. Therefore, it is vital, both for individuals and companies, to <b>control the information they expose<\/b>. In essence, knowing more about OSINT also means <b>better protecting oneself from it<\/b>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-an-osint-approach-work\">How does an OSINT approach work?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-passive-osint-vs-active-osint\">Passive OSINT vs. Active OSINT<\/h3>\n\n\n\n<p>Before beginning, it&#8217;s useful to distinguish between two main approaches. <b>Passive OSINT<\/b> entails <b>collecting information without engaging with the target<\/b>. In other words, you observe, you investigate, but without leaving a trace. It&#8217;s ideal for remaining discreet.<\/p>\n\n\n\n<p>Conversely, <b>Active OSINT<\/b> involves direct action: sending a message, signing up on a site, asking questions undercover&#8230; It&#8217;s riskier but sometimes necessary for deeper insight.<\/p>\n\n\n\n<p>We recommend prioritizing the passive approach when feasible. It is <b>legal, ethical<\/b>, and often <b>adequately effective<\/b>.<\/p>\n\n\n\n<div>\n  <table style=\"width:100%;border-collapse: collapse;border: 1px solid #ddd\">\n    <thead>\n      <tr style=\"background-color: #ff6745;color: #efefef\">\n        <th style=\"border: 1px solid #ddd;padding: 8px\">Criterion<\/th>\n        <th style=\"border: 1px solid #ddd;padding: 8px\">Passive OSINT<\/th>\n        <th style=\"border: 1px solid #ddd;padding: 8px\">Active OSINT<\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <tr>\n        <td style=\"border: 1px solid #ddd;padding: 8px\"><strong>Interaction<\/strong><\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">None, observation is discreet<\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Direct interaction with target (messages, actions)<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border: 1px solid #ddd;padding: 8px\"><strong>Risk Level<\/strong><\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Low, as it is non-intrusive<\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Higher, may be detected<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border: 1px solid #ddd;padding: 8px\"><strong>Typical Usage<\/strong><\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Initial research, discreet monitoring<\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">In-depth investigation, targeted access<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border: 1px solid #ddd;padding: 8px\"><strong>Legality<\/strong><\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Fully legal<\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Legal if ethical boundaries are respected<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border: 1px solid #ddd;padding: 8px\"><strong>Examples<\/strong><\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Browsing public profiles, Google Dorks<\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Creating fake profiles, direct exchanges<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border: 1px solid #ddd;padding: 8px\"><strong>Recommendation<\/strong><\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Prefer by default<\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Use with caution<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/div>\n\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2025\/05\/ChatGPT-Image-8-avr.-2025-14_37_50-1024x683.png\" alt=\"\" \/><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/liora.io\/en\/courses\/data-ai\/\">Training in OSINT<\/a><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-typical-steps-of-an-osint-investigation\">Typical Steps of an OSINT Investigation<\/h3>\n\n\n\n<p>To help you visualize the process better, here are the <b>major steps<\/b> of a typical OSINT approach:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><b>Define a clear objective<\/b>: What exactly are we seeking?<\/li>\n\n\n\n<li><b>List potential sources<\/b> of information.<\/li>\n\n\n\n<li><b>Collect data<\/b> using appropriate tools such as <a href=\"https:\/\/liora.io\/en\/data-warehouse-definition\">a Data Warehouse<\/a>.<\/li>\n\n\n\n<li><b>Analyze, cross-reference, sort<\/b> to verify consistency.<\/li>\n\n\n\n<li><b>Produce a concise report<\/b> that is clear and actionable.<\/li>\n<\/ol>\n\n\n\n<p>It may seem simple, but a good OSINT investigation requires <b>methodology, curiosity, and discernment<\/b>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-data-can-be-exploited\">What Data Can Be Exploited?<\/h3>\n\n\n\n<p>Different types of data are exploited depending on the context, but generally, the focus is on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Public social profiles<\/b> (LinkedIn, Facebook\u2026),<\/li>\n\n\n\n<li><b>Domain names<\/b> or email addresses,<\/li>\n\n\n\n<li><b>PDF documents<\/b> indexed by Google,<\/li>\n\n\n\n<li><b>Photos, metadata, site histories,<\/b><\/li>\n\n\n\n<li>or even <b>technical data<\/b> (IP, ports, DNS\u2026).<\/li>\n<\/ul>\n\n\n\n<p><b>Everything public is potentially exploitable<\/b>, provided you know where to search.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-three-characteristics-of-osint-data\">The Three Characteristics of OSINT Data<\/h3>\n\n\n\n<p>To be genuinely useful, OSINT data must be accessible and freely available without hacking. It is also critical to ensure its reliability and verify that it comes from a credible source and is directly related to our objective, ensuring its relevance. If a piece of information does not meet these three criteria, it is better to be cautious.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-are-the-best-osint-tools\">What are the Best OSINT Tools?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-essential-tools-shodan-maltego-spiderfoot-theharvester\">Essential Tools: Shodan, Maltego, SpiderFoot, theHarvester\u2026<\/h3>\n\n\n\n<p>These names might be unfamiliar, but they are among the <b>pillars of OSINT<\/b>:<\/p>\n\n\n\n<div>\n  <table style=\"width:100%;border-collapse: collapse;border: 1px solid #ddd\">\n    <thead>\n      <tr style=\"background-color: #ff6745;color: #efefef\">\n        <th style=\"border: 1px solid #ddd;padding: 8px\">Tool<\/th>\n        <th style=\"border: 1px solid #ddd;padding: 8px\">Main Function<\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <tr>\n        <td style=\"border: 1px solid #ddd;padding: 8px\"><strong>Shodan<\/strong><\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Explores connected devices (servers, cameras, IoT) accessible on the web<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border: 1px solid #ddd;padding: 8px\"><strong>Maltego<\/strong><\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Visualizes relationships between people, companies, domain names, IP addresses<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border: 1px solid #ddd;padding: 8px\"><strong>SpiderFoot<\/strong><\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Automates data collection from numerous OSINT sources<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"border: 1px solid #ddd;padding: 8px\"><strong>theHarvester<\/strong><\/td>\n        <td style=\"border: 1px solid #ddd;padding: 8px\">Retrieves emails, domain names, subdomains, and public IP addresses<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/div>\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-focus-on-osint-framework\">Focus on OSINT Framework<\/h3>\n\n\n\n<p>If you&#8217;re a beginner, utilizing <a href=\"https:\/\/liora.io\/en\/framework-what-is-it\">a framework<\/a> is crucial, and the <b>OSINT Framework<\/b> is a valuable ally. It is a <b>free platform<\/b> that aggregates <b>hundreds of tools categorized by usage<\/b>: social networks, emails, technical data, etc.<\/p>\n\n\n\n<p>This site ensures we <b>don&#8217;t miss anything<\/b> and always select <b>the most appropriate tool<\/b> for our objective.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-best-free-osint-tools\">The Best Free OSINT Tools<\/h3>\n\n\n\n<p>Here&#8217;s some good news: you don&#8217;t need to pay to start.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Google Dorks: advanced and highly precise Google searches.<\/li>\n\n\n\n<li><b>Recon-ng<\/b>: a comprehensive command-line framework.<\/li>\n\n\n\n<li><b>FOCA \/ Metagoofil<\/b>: to extract metadata from documents.<\/li>\n<\/ul>\n\n\n\n<p>With these tools, you can do a lot without spending a dime.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2025\/05\/ChatGPT-Image-8-avr.-2025-14_29_39-2-1024x683.png\" alt=\"\" \/><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/liora.io\/en\/courses\/data-ai\/\">Training in Cybersecurity tools<\/a><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-osint-online-reference-platforms-and-sites\">OSINT Online: Reference Platforms and Sites<\/h3>\n\n\n\n<p>Here are some online sources used daily:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Have I Been Pwned<\/b>: to check if an email address has been compromised.<\/li>\n\n\n\n<li><b>Wayback Machine<\/b>: to view previous versions of websites.<\/li>\n\n\n\n<li><b>Hunter.io<\/b>: to find email addresses associated with a domain.<\/li>\n\n\n\n<li><b>Whois \/ DNSlytics<\/b>: to retrieve technical information about a site.<\/li>\n<\/ul>\n\n\n\n<p>These platforms are both <b>powerful, reliable, and easy to use<\/b>. If you are starting, begin with these.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-do-you-train-in-osint\">How do you train in OSINT?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-key-skills-to-become-an-osint-expert\">Key Skills to Become an OSINT Expert<\/h3>\n\n\n\n<p>To become a genuine <b>OSINT expert<\/b>, you need to develop a combination of technical and analytical skills. It is crucial to know how to search for information in the right places, operate <a href=\"https:\/\/liora.io\/en\/data-analysis-definition-use-of-cases-and-tools\">collection tools<\/a> with precision, and above all, interpret data with insight and discernment. Curiosity, rigor, and patience are your best allies in this profession. You will also need to understand the basics of <b>cybersecurity<\/b>, become familiar with some <a href=\"https:\/\/liora.io\/en\/all-about-script-automation\">scripts<\/a> or command lines, and adopt an investigative mindset. The more you can cross-reference data, the more relevant your analyses will be.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-working-in-osint-what-career-opportunities\">Working in OSINT: What Career Opportunities?<\/h3>\n\n\n\n<p>Currently, career opportunities in OSINT are numerous and diverse. You can join a company as an analyst, work in a monitoring team within a public organization, or even engage in ad-hoc missions to <a href=\"https:\/\/liora.io\/en\/all-about-cyber-defense\">identify threats<\/a>, detect leaks, or better understand a brand&#8217;s competitive landscape. There is also an increasing demand in the fields of investigative journalism, national security, and privacy protection. In summary, if you enjoy observing, connecting, and comprehending, OSINT is a rich and stimulating field.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-training-with-liora-a-program-tailored-to-cyber-challenges\">Training with Liora: A Program Tailored to Cyber Challenges<\/h3>\n\n\n\n<p>At Liora, you can pursue cybersecurity training. Our programs are designed for those wanting to acquire practical skills useful from the first assignments. The learning process is progressive, incorporating real cases, tools used in the industry, and personalized educational support. You will also benefit from a structured framework, where each concept is contextualized in scenarios close to the professional world. If you seek comprehensive, rigorous, and market-relevant training, it&#8217;s an excellent starting point.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/liora.io\/en\/courses\/data-ai\/\">Register for one of our Cybersecurity courses<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-osint-a-strategic-tool-for-cybersecurity-professions\">OSINT: A Strategic Tool for Cybersecurity Professions<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-digital-sovereignty-issues\">Digital Sovereignty Issues<\/h3>\n\n\n\n<p>In a world where information circulates swiftly, mastering OSINT becomes a matter of sovereignty. States, businesses, and even local authorities must monitor what is being said, shared, and potentially weaken them. By systematically collecting public data, you help enhance the resilience of organizations, prevent crises, and inform decision-making. In this context, OSINT becomes a sometimes overlooked but remarkably effective digital self-defense tool.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-ethical-and-legal-challenges-of-open-source-intelligence\">The Ethical and Legal Challenges of Open Source Intelligence<\/h3>\n\n\n\n<p>OSINT should not become an excuse for exploiting everything. Although information is public, it is not always free of rights. You must respect the legal framework, especially data protection regulations like the GDPR. Beyond the law, there is also an ethical dimension. Should data be used if it can harm privacy, even indirectly? In our view, practicing OSINT also means being responsible and knowing when to stop. This professionalism differentiates a good analyst from a mere curious individual.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2025\/05\/8-avr.-2025-14_40_03-1024x683.png\" alt=\"\" \/><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/liora.io\/en\/courses\/data-ai\/\">Become a cybersecurity expert<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n\n\n\n<p>OSINT is now a cornerstone of modern cybersecurity. Accessible, potent, and legal, it converts public data into strategic action levers. Yet, its power is as much in the tools as in the human capacity: the ability to search, cross-reference, understand, and above all, decide what should \u2014 or should not \u2014 be used.<\/p>\n\n\n\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": [\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What is OSINT?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"OSINT (Open Source Intelligence) refers to the collection and analysis of publicly available information such as social media, websites, and forums for investigative purposes.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Is OSINT legal?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Yes, OSINT is legal as long as it involves data that is publicly available and does not involve hacking or breaking laws like GDPR.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"How is OSINT used in cybersecurity?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"OSINT is used in cybersecurity to identify vulnerabilities, track exposed information, and map threats before they materialize, making it a proactive defense tool.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What are the types of OSINT?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"There are two main types of OSINT: passive OSINT, which involves observing and collecting data without interaction, and active OSINT, which involves direct interaction with the target for deeper insights.\"\n      }\n    }\n  ]\n}\n<\/script>\n\n","protected":false},"excerpt":{"rendered":"<p><strong><b>OSINT, or open source intelligence, is revolutionizing the norms of cybersecurity. By utilizing publicly accessible information, it allows for threat anticipation, conducting investigations, and protecting organizations without breaking the law. Discover how OSINT operates, what tools to use, and why this discipline is becoming indispensable in cybersecurity professions.<\/b><\/strong><\/p>\n","protected":false},"author":82,"featured_media":196156,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"editor_notices":[],"footnotes":""},"categories":[2426],"class_list":["post-196154","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"_links":{"self":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/196154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/comments?post=196154"}],"version-history":[{"count":4,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/196154\/revisions"}],"predecessor-version":[{"id":206731,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/196154\/revisions\/206731"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/media\/196156"}],"wp:attachment":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/media?parent=196154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/categories?post=196154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}