Title | Category | Author | Date |
Investigating Emails with the Holehe Transform for Maltego | Cybersecurity Investigation Tutorial | Joseph Jones - OS2INT | 08 Apr 2022 |
Exposing an Active Kaseya Ransomware Attack Infrastructure
| Cybersecurity Investigation | WhoisXML AMPI | 03 Nov 2021 |
The Many Tentacles of Magecart Group 8 | Cybersecurity Investigation | Jérôme Segura | 13 Sept 2021 |
|
How Do You Run a Cybercrime Gang? | Cybersecurity Investigation | Bushido Token | 04 Sept 2021 |
Pivoting off of a Phishing Domain | Cybersecurity Investigation | John Hammond | 27 Aug 2021 |
Protect Your Organization with NIST NVD and Maltego
| Cybersecurity Investigation Tutorial
| Maltego
| 12 Aug 2021
|
Identify and Understand Malware with Maltego and URLHaus by Abuse.ch | Cybersecurity Investigation Tutorial | Maltego | 04 Aug 2021 |
Chasing DarkSide Affiliates: Identifying Threat Actors Connected to Darkside Ransomware Using Maltego & Intel 471
| Cybersecurity Investigation Tutorial
| Maltego
| 22 June 2021
|
Introducing The New Silobreaker Transforms for Maltego | Cybersecurity Investigation Tutorial | Maltego | 14 Jun 2021 |
Password Attacks 101 | Cybersecurity Investigation
| Cesar Anjos | 11 Jun 2021 |
DittoTRX: A Maltego Transform Server for IDN Homograph Attacks - Part 1 Setting Up
| Cybersecurity Investigation
| Maltego | 31 May 2021
|
DittoTRX: A Maltego Transform Server for IDN Homograph Attacks - Part 2 Investigation
| Cybersecurity Investigation
| Maltego | 31 May 2021
|
Comprehensive information gathering with Maltego | Product Tutorial | David Artykov | 28 May 2021 |
Cryptocurrency scam schemes: following the money | Cryptocurrency Fraud Investigation | What The Fraud - Kypexin | 26 May 2021 |
How to Conduct Person of Interest Investigations using OSINT and Maltego | Person of Interest Investigation | Maltego | 25 Feb 2021 |
Vulnerabilities Related to The Use of VPNs in COVID-19 Remote Working Situation
| Cybersecurity Investigation | Maltego | 21 Oct 2020 |
Zeek Log Reconnaissance with Network Graphs Using Maltego Casefile | Cybersecurity Investigation | Ricky Tan | 21 Sept 2020 |
Conduct Investigations Securely and Privately Using Maltego's Stealth Mode | Product Tutorial | Maltego | 24 Aug 2020 |
Enrich your Maltego Graph with Visual Information by Customizing Entity Overlay Icons | Product Tutorial | Maltego | 13 Aug 2020 |
Vulnerabilities Related to The Use of VPNs in COVID-19 Remote Working Situation | Cybersecurity Investigation | Maltego | 21 Oct 2020 |
Identifying Risky Bitcoin Transactions with Maltego and CipherTrace Blockchain Intelligence
| Fraud Investigation
| Maltego | 31 July 2020 |
Naikon APT: Cyber Espionage Reloaded | Cybersecurity Investigation | Check Point Research | 07 May 2020 |
How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPwned | Cybersecurity Investigation | Irfaan Shakeel | 25 Apr 2020 |
Data Scraping and Visualizing using Instant Data Scraper, ViewDNS.info, and Maltego | Product Tutorial | Micah Hoffman | 15 Apr 2020 |
The Iron March Data Dump Provides a Window Into How White Supremacists Communicate and Recruit | Person of Interest Investigation | Jacques Singer-Emery | 27 Feb 2020 |
Network Footprinting with Machines in Maltego | Cybersecurity Investigation
| Maltego | 12 Nov 2019 |
Fighting Cyberbullies and Harassment with Martial Art and Maltego
| Person of Interest Investigation
| Maltego | 28 Oct 2019 |
Maltego and OSINT for Crime Scene Analysis | Cybersecurity Investigation | Andrew Fordred | 02 July 2018
|
Using Maltego for Cellphone Analysis and Geolocation with OSINT | Cybersecurity Investigation | Andrew Fordred | 17 Jun 2018 |
Spying on a budget (Inside a Phishing Operation with Targets in the Tibetan Community) | Cybersecurity Investigation | Masashi Crete-Nishihata, Jakub Dalek, Etienne Maynier, and John Scott-Railton
| 30 Jan 2018 |
Uncovering a New Angler-Bedep Actor | Person of Interest Investigation | John D Swanson | 12 Apr 2016 |