What is OSINT?
Open Source Intelligence is publicly available information that anyone can find—and that attackers use to target your business.
The Simple Explanation
OSINT stands for Open Source Intelligence—information collected from publicly available sources. This includes anything you can find without hacking, breaking laws, or accessing private systems.
Your company website, LinkedIn profiles, press releases, job postings, court records, domain registrations—all of it is OSINT. Individually, these seem harmless. Combined, they form a detailed profile that sophisticated attackers use to craft convincing attacks against your organization.
Why OSINT Matters for Your Business
Unintended Exposure
Information you share for marketing, recruiting, or compliance creates a detailed map of your organization that you never intended to publish.
Social Engineering
Every detail about your people, vendors, and projects becomes ammunition for convincing phishing emails and pretexting attacks.
Attack Surface
Technical details scattered across the internet help attackers understand your defenses and find the weakest entry points.
Where Attackers Find Information
These everyday sources become intelligence when viewed through an attacker's lens.
Corporate Websites
Company pages, press releases, leadership bios, and org charts reveal structure, priorities, and key personnel.
Social Media
LinkedIn profiles, Twitter posts, and Facebook pages expose employee details, relationships, and communication patterns.
Technical Footprint
DNS records, SSL certificates, and IP ranges map your infrastructure and reveal the technologies you use.
Job Postings
Open positions reveal tech stacks, security gaps, team structures, and upcoming projects.
Public Records
SEC filings, court documents, and government databases expose financial details, partnerships, and legal history.
Code Repositories
GitHub repos, Stack Overflow questions, and developer forums can leak credentials, internal tools, and architecture details.
How Attackers Use OSINT
The attack chain: from public information to successful compromise.
1. Reconnaissance
Attackers systematically collect every piece of public information about your organization—names, emails, vendors, events, technologies.
2. Target Selection
Using gathered intelligence, they identify high-value targets: executives with wire authority, IT admins with system access, or new employees still learning processes.
3. Pretexting
They craft believable scenarios using real details—referencing actual vendors, recent events, or internal projects to build trust and bypass suspicion.
4. Attack Execution
A carefully timed email, call, or message that looks legitimate because it uses real context. The target complies because everything checks out.
“To a normal reader, your public information is brand-building. To me, it's an instruction manual. I see the org chart, the vendors, the events—and I see exactly how to get inside.”
See What Attackers See
AiVersary scans the same sources attackers use and shows you exactly what they'd find—before they find it.