PinnedErvin ZubicinOSINT AmbitionThe Importance of Managed Attribution in OSINT InvestigationsLearn why managed attribution is vital in OSINT investigations and how to protect your digital footprint for safer, more effective…Aug 28Aug 28
PinnedErvin ZubicinOSINT AmbitionPython for Dark Web OSINT: Automate Threat MonitoringLearn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence.Apr 265Apr 265
PinnedErvin ZubicinOSINT AmbitionOSINT Analysis with ChatGPT: Augment Your Intel Reporting with Intel Assistant BotStreamline OSINT report writing with ChatGPT’s Intel Assistant Agent. Learn how to create impactful intel briefs. Agent link included.May 6May 6
PinnedErvin ZubicinCoinmonksElevate Your Blockchain Security: Python Techniques to Monitor Tornado Cash and New ContractsExplore our essential Python script for blockchain security: a proactive tool for monitoring Tornado Cash-funded activities and new…Dec 31, 2023Dec 31, 2023
PinnedErvin ZubicinCoinmonksWeb3 Illusion? Study Reveals Shocking Data Leaks from Wallets, DappsThink Web3 is private? Think again. Researchers found widespread leaks of wallet data, allowing third-party trackers to build profiles and…May 8May 8
Ervin ZubicinDataDrivenInvestorWhy Arresting Tech CEOs Won’t Stop Crime: The Battle Between Privacy and SecurityArresting tech CEOs won’t stop crime but threatens privacy. Explore smarter solutions to tackle criminal misuse of platforms without…21h ago121h ago1
Ervin ZubicinCoinmonksWhich Smart Contract Language Is Best for Blockchain Development in 2024?Looking for the best smart contract language for blockchain development in 2024? A new study compares Solidity, Rust, Aiken, PyTeal, Move…Sep 8Sep 8
Ervin ZubicinDataDrivenInvestorHow Did the Telegram CEO Arrest Impact Illicit Crypto Activity on the Platform?How has the arrest of Telegram’s CEO impacted illicit crypto activity? The answer may surprise you. Read on.Sep 31Sep 31
Ervin ZubicinOSINT TeamNavigating the Cyber Threat Landscape: A Complete Guide to the CTI LifecycleExplore how the cyber threat intelligence lifecycle enhances security in daily workflows with this practical guide for analysts.Aug 27Aug 27
Ervin ZubicinOSINT AmbitionCan Understanding of Naming Conventions Help Solve Your OSINT Case?Stuck in your OSINT investigation? Names hold the key! Find hidden clues & solve cases faster with this guide to global naming conventions.Aug 14Aug 14