<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Bangaly Koita - osintafrica</title>
	<atom:link href="https://www.osintafrica.net/author/admin/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osintafrica.net</link>
	<description>intelligency blog</description>
	<lastBuildDate>Sun, 12 Apr 2026 14:13:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=32%2C32&#038;ssl=1</url>
	<title>Bangaly Koita - osintafrica</title>
	<link>https://www.osintafrica.net</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">221010672</site>	<item>
		<title>Best recommendations to protect your WordPress website</title>
		<link>https://www.osintafrica.net/best-recommendations-to-protect-your-wordpress-website/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=best-recommendations-to-protect-your-wordpress-website</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Sun, 12 Apr 2026 14:01:49 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=1001</guid>

					<description><![CDATA[<p>WordPress is a free, open-source content management system used to create and manage websites without...</p>
<p>The post <a href="https://www.osintafrica.net/best-recommendations-to-protect-your-wordpress-website/">Best recommendations to protect your WordPress website</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;">WordPress is a free, open-source content management system used to create and manage websites without needing much coding (<a href="https://wordpress.com/">WordPress.com: Everything You Need to Build Your Website</a>).</span></p>
<p><span style="color: #000000;">The tool let you build (The Build websites, write blog posts, Design pages, Manage content easily) from a dashboard.</span></p>
<p><span style="color: #000000;">WordPress itself is secure, but poor setup such as (Weak passwords, Outdated plugins and others) can make a site vulnerable which leads to the threat actors targeting your website.</span></p>
<p><span style="color: #000000;">To prevent it, we need to follow some recommendations. Let&#8217;s have a look at them.</span></p>
<p><strong><span style="color: #000000;">Recommendations:</span></strong></p>
<ul>
<li><span style="color: #000000;">Update WordPress core, themes regularly</span></li>
<li><span style="color: #000000;">Auto update for the plugin or regularly scan to detect any vulnerability</span></li>
<li><span style="color: #000000;">Delete unused plugins, themes</span></li>
<li><span style="color: #000000;">Use long, unique passwords not reused anywhere</span></li>
<li><span style="color: #000000;">Change the default “admin” username</span></li>
<li><span style="color: #000000;">Enable 2FA (two-factor authentication)</span></li>
<li><span style="color: #000000;">Block malicious traffic</span></li>
<li><span style="color: #000000;">Limit login attempts</span></li>
<li><span style="color: #000000;">Install an SSL certificate such as Let’s<strong> Encrypt</strong></span></li>
<li><span style="color: #000000;">Daily or weekly backups</span></li>
<li><span style="color: #000000;">DDOS protection plugin</span></li>
<li><span style="color: #000000;">Maintenance windows plugin</span></li>
<li><span style="color: #000000;">Plugin to accept or refuse the usage of Cookies</span></li>
<li><span style="color: #000000;">Banner for GDPR or Privacy plugin</span></li>
<li><span style="color: #000000;">Reduce brute-force attacks on your WordPress site by hiding <strong>wp-login.php</strong> changing the login URL so bots can’t easily find it.</span></li>
<li><span style="color: #000000;">Store backups off-site</span></li>
<li><span style="color: #000000;">Change default database prefix for example mywebsite.com/<strong>wp-admin</strong> to mywebsite.com/change</span></li>
<li><span style="color: #000000;">Restrict file permissions:</span></li>
<li><span style="color: #000000;">wp-config.php contains your <strong>database credentials, security keys, and sensitive settings</strong>, so it should be protected by following the recommendations:</span></li>
<li><span style="color: #000000;">Move wp-config.php outside web root</span></li>
<li><span style="color: #000000;">Add .htaccess protection</span></li>
<li><span style="color: #000000;">Set permissions to 400/440</span></li>
<li><span style="color: #000000;">Disable file editing plugin if not needed</span></li>
<li><span style="color: #000000;">Disable XML-RPC if not needed</span></li>
<li><span style="color: #000000;">Hide WordPress version</span></li>
<li><span style="color: #000000;">Use a Web Application Firewall</span></li>
<li><span style="color: #000000;">Hide all the webpage or make them not accessible for example</span></li>
<li><span style="color: #000000;">Add to robots.txt. For example:</span></li>
</ul>
<p><span style="color: #000000;">User-agent: *</span><br />
<span style="color: #000000;">Disallow: /</span></p>
<p><span style="color: #000000;">Or</span></p>
<p><span style="color: #000000;"><strong>Block access via .htaccess:</strong></span></p>
<p><span style="color: #000000;">Order Deny,Allow</span></p>
<p><span style="color: #000000;">Deny from all</span></p>
<p><span style="color: #000000;">Allow from YOUR_IP</span></p>
<p>&nbsp;</p>
<ul>
<li><span style="color: #000000;">Protecting <strong>phpMyAdmin</strong> is critical because if someone gets access, they can control your entire WordPress database (users, passwords, content, everything).</span></li>
<li><span style="color: #000000;"><strong>Change or hide phpMyAdmin URL:</strong></span></li>
</ul>
<p><span style="color: #000000;"><strong>Default URLs:</strong></span></p>
<p><span style="color: #000000;">/phpmyadmin</span><br />
<span style="color: #000000;">/pma</span><br />
<span style="color: #000000;">/mysql</span></p>
<p>&nbsp;</p>
<p><span style="color: #000000;">Like you see, they are many configurations and settings to implement to make your WordPress website more secure. Be aware that security should be the first step to start your WordPress journey.</span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/best-recommendations-to-protect-your-wordpress-website/">Best recommendations to protect your WordPress website</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1001</post-id>	</item>
		<item>
		<title>OSINT tools to monitor the Strait of Hormuz</title>
		<link>https://www.osintafrica.net/osint-tools-to-monitor-the-strait-of-hormuz/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=osint-tools-to-monitor-the-strait-of-hormuz</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Sat, 04 Apr 2026 14:03:37 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<category><![CDATA[monitoring the Strait of Hormuz]]></category>
		<category><![CDATA[Osint of the Strait of Hormuz]]></category>
		<category><![CDATA[Strait of Hormuz]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=994</guid>

					<description><![CDATA[<p>The Strait of Hormuz is one of the most important chokepoints in the world economically,...</p>
<p>The post <a href="https://www.osintafrica.net/osint-tools-to-monitor-the-strait-of-hormuz/">OSINT tools to monitor the Strait of Hormuz</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;">The Strait of Hormuz is one of the most important chokepoints in the world economically, militarily, and politically.</span><br />
<span style="color: #000000;">Around 20 to 25% of the world’s oil supply passes through this narrow strait.</span></p>
<p><span style="color: #000000;">Major oil exporters like Saudi Arabia, Iran, Iraq, Kuwait, and United Arab Emirates rely on it.</span></p>
<p><span style="color: #000000;">It’s also critical for liquefied natural gas (LNG), especially exports from Qatar.</span></p>
<p><span style="color: #000000;">If the strait is disrupted, global oil prices can spike immediately.</span></p>
<p><span style="color: #000000;">Due to the conflict between Iranian, Israel and USA. The situation remains unclear.</span></p>
<p><span style="color: #000000;">The vessels are not travelling through the Strait Hormuz.</span></p>
<p><span style="color: #000000;">Monitoring the Strait of Hormuz using OSINT relies on combining maritime tracking, satellite imagery, news, and geopolitical analysis tools. Here are the main categories and widely used tools:</span></p>
<p><span style="color: #000000;"><strong>1. Vessel Tracking (AIS Data)</strong></span></p>
<p><span style="color: #000000;">These tools track ships in real time using AIS (Automatic Identification System), which is crucial for monitoring oil tankers and naval activity.</span></p>
<ul>
<li><a href="https://www.marinetraffic.com/en/ais/home/centerx:56.445/centery:27.093/zoom:13">MarineTraffic: Global Ship Tracking Intelligence | AIS Marine Traffic</a></li>
</ul>
<p><span style="color: #000000;">The<strong> MarineTraffic</strong> is a commercial online ship-tracking and maritime analytics platform that visualizes global vessel movements in near real time. It aggregates data from a vast community AIS (Automatic Identification System) receiver network plus satellites, serving everyone from hobby ship-spotters to logistics, insurance, and energy companies.</span></p>
<ul>
<li><a href="https://www.vesselfinder.com/">Ship &amp; Container Tracking &#8211; VesselFinder</a></li>
</ul>
<p><span style="color: #000000;">The<strong> VesselFinder</strong> is an online and mobile software platform providing real-time Automatic Identification System (AIS) vessel tracking and maritime analytics. It enables users to view ship positions, voyage details, and port activity globally, serving both casual users and maritime professionals. Its open-access approach and map-based interface have made it one of the most visited AIS tracking tools worldwide.</span></p>
<p><span style="color: #000000;"><strong>2. Satellite Imagery Platforms</strong></span></p>
<p><span style="color: #000000;">The <strong> Satellite Imagery Platforms</strong> can be used to verify activity even when AIS is turned off (dark ships) such as:</span></p>
<blockquote><p><span style="color: #000000;">Detecting ship (clusters)</span></p></blockquote>
<blockquote><p><span style="color: #000000;">Monitoring military buildup or port congestion</span></p></blockquote>
<blockquote><p><span style="color: #000000;">Oil spills or maritime incidents</span></p></blockquote>
<ul>
<li><a href="https://earth.google.com/web/">Google Earth</a></li>
</ul>
<p><span style="color: #000000;"><strong>Google Earth</strong> is a geospatial visualization tool developed by Google that displays a 3D representation of Earth based on satellite imagery, aerial photography, and GIS data. It allows users to explore geographic information, view terrain and buildings in three dimensions, and access historical imagery across the globe.</span></p>
<ul>
<li><a href="https://www.satellites.live/">https://www.satellites.live/</a></li>
</ul>
<p><span style="color: #000000;">satellites.live is a free web-based satellite tracking tool that lets you visualize and follow objects orbiting Earth in near real time.</span></p>
<p><span style="color: #000000;">it’s like a radar screen for space, showing what’s flying above Earth right now.</span></p>
<p><span style="color: #000000;"><strong>3. Radio &amp; Signal Monitoring</strong></span></p>
<ul>
<li><a href="http://websdr.org/">websdr.org</a></li>
</ul>
<p><span style="color: #000000;"><strong>WebSDR</strong> is an online software platform that allows multiple users to listen simultaneously to a wide range of radio frequencies through a shared <strong>software-defined radio (SDR)</strong> receiver. It provides real time access to radio spectrum data via a web browser, enabling remote tuning, demodulation, and listening without specialized hardware.</span></p>
<ul>
<li><a href="https://www.aishub.net/ais-dispatcher">AIS Dispatcher &#8211; free AIS data sharing tool | AISHub</a></li>
</ul>
<p><span style="color: #000000;">AIS Dispatcher is a Windows-based software tool used to decode, filter, and forward Automatic Identification System (AIS) data from ship transponders and receivers. It acts as an intermediary between AIS receivers and data servers or clients, enabling flexible routing of real-time vessel traffic information across multiple network destinations.</span></p>
<p><span style="color: #000000;">Monitoring the Strait of Hormuz with OSINT is about layering multiple data sources no single tool is enough. The most reliable insights come from combining ship tracking, satellite imagery, and real time reporting.</span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/osint-tools-to-monitor-the-strait-of-hormuz/">OSINT tools to monitor the Strait of Hormuz</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">994</post-id>	</item>
		<item>
		<title>Online Document Signing Platforms used for Phishing Attacks</title>
		<link>https://www.osintafrica.net/online-document-signing-platforms-used-for-phishing-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=online-document-signing-platforms-used-for-phishing-attacks</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Sun, 15 Mar 2026 16:53:08 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=990</guid>

					<description><![CDATA[<p>Electronic signature platforms such as Docusign, Dropbox Sign, Google Docs, OneDrive signature and Adobe Sign...</p>
<p>The post <a href="https://www.osintafrica.net/online-document-signing-platforms-used-for-phishing-attacks/">Online Document Signing Platforms used for Phishing Attacks</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;">Electronic signature platforms such as Docusign, Dropbox Sign, Google Docs, OneDrive signature and Adobe Sign have revolutionized business processes by enabling fast, paperless transactions. However, cybercriminals have also recognized their potential as a vector for phishing attacks. By mimicking legitimate signing requests, attackers trick users into revealing sensitive information or downloading malware.</span></p>
<p><span style="color: #000000;"><strong>Techniques used by threat actors to trick users:</strong></span></p>
<p><span style="color: #000000;"><strong>Fake Signing Requests</strong></span></p>
<p><span style="color: #000000;">Attackers send emails that look like legitimate requests from trusted platforms such as Docusign, Adobe Sign. These emails often contain urgent language like “Your signature is required immediately.”</span></p>
<p><span style="color: #000000;"><strong>Malicious Links</strong></span></p>
<p><span style="color: #000000;">The email includes a link to a fake login page mimicking the real service. Victims enter credentials, which attackers steal.</span></p>
<p><span style="color: #000000;"><strong>Malware Delivery</strong></span></p>
<p><span style="color: #000000;">Some phishing emails include attachments disguised as documents to sign, which actually contain malware.</span></p>
<p><span style="color: #000000;"><strong>Business Email Compromise (BEC)</strong></span></p>
<p><span style="color: #000000;">Attackers impersonate executives or vendors, requesting signatures on fraudulent documents (e.g., payment authorizations).</span><span style="color: #000000;"><strong> </strong></span></p>
<p><span style="color: #000000;"><strong>Red Flags to Detect Phishing</strong></span></p>
<p><span style="color: #000000;">Unexpected signing requests from unknown senders.</span></p>
<p><span style="color: #000000;">Generic greetings like “Dear Customer” instead of your name.</span></p>
<p><span style="color: #000000;">Suspicious URLs (hover over links before clicking).</span></p>
<p><span style="color: #000000;">Urgency or threats in the message.</span></p>
<p><span style="color: #000000;">Requests for credentials beyond normal signing process.</span></p>
<p><span style="color: #000000;"><strong>Tools Commonly Used by Threat Actors</strong></span></p>
<p><span style="color: #000000;">Email Spoofing Tools (e.g., Sendmail, Postfix misconfigurations)</span></p>
<p><span style="color: #000000;">Used to forge sender addresses and bypass basic email filters.</span></p>
<p><span style="color: #000000;">Phishing Kits (e.g., Evilginx, Modlishka)</span></p>
<p><span style="color: #000000;">Enable creation of realistic login pages and capture credentials.</span></p>
<p><span style="color: #000000;">URL Shorteners</span></p>
<p><span style="color: #000000;">Hide malicious links behind shortened URLs to evade detection.</span></p>
<p><span style="color: #000000;">Malware Loaders</span></p>
<p><span style="color: #000000;">Embedded in attachments disguised as PDFs or signing documents.</span></p>
<p><span style="color: #000000;"><strong> </strong><strong>Conclusion</strong></span></p>
<p><span style="color: #000000;">While online document signing platforms offer convenience, they also present a significant attack surface for phishing campaigns. Organizations must implement robust email security, user awareness training, and multi-factor authentication to mitigate these threats. Vigilance and verification are key always confirm the legitimacy of signing requests before clicking any link.</span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/online-document-signing-platforms-used-for-phishing-attacks/">Online Document Signing Platforms used for Phishing Attacks</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">990</post-id>	</item>
		<item>
		<title>Best OSINT tools to investigate Typo squatting domains</title>
		<link>https://www.osintafrica.net/best-osint-tools-to-investigate-typo-squatting-domains/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=best-osint-tools-to-investigate-typo-squatting-domains</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Tue, 23 Dec 2025 17:22:37 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<category><![CDATA[DNSTwister.report]]></category>
		<category><![CDATA[havebeensquatted.com]]></category>
		<category><![CDATA[Typosquatting]]></category>
		<category><![CDATA[typosquatting-finder.circl.lu]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=982</guid>

					<description><![CDATA[<p>A typo squatting attack is when someone creates a fake website or online service whose...</p>
<p>The post <a href="https://www.osintafrica.net/best-osint-tools-to-investigate-typo-squatting-domains/">Best OSINT tools to investigate Typo squatting domains</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;">A typo squatting attack is when someone creates a fake website or online service whose name is a <strong>misspelled version of a legitimate one</strong>, hoping that people will accidentally type it wrong and land on the attacker’s site.</span></p>
<p><span style="color: #000000;">For example, someone might register <strong>gooogle.com</strong> instead of <strong>google.com</strong>.</span></p>
<p><span style="color: #000000;">The attacker’s goal can vary:</span></p>
<ul>
<li><span style="color: #000000;">Steal passwords or personal info (phishing)</span></li>
<li><span style="color: #000000;">Install malware</span></li>
<li><span style="color: #000000;">Show ads or scam offers</span></li>
<li><span style="color: #000000;">Imitate a real brand to trick users</span></li>
</ul>
<p><span style="color: #000000;"><strong>1. DNSTwister</strong></span></p>
<p><span style="color: #000000;">DNSTwister is a service for generating <em>typo-permutations</em> of a given domain and checking which of those similar domains are actually registered.</span></p>
<p><span style="color: #000000;">It helps detect potential phishing, typosquatting, or domain impersonation risk.</span></p>
<p><span style="color: #000000;">Beyond one-off lookups, it offers <strong>monitoring</strong>: you can subscribe to have DNSTwister continuously check for new similar domains, or for DNS changes (like MX records).</span></p>
<p><span style="color: #000000;">A company wanting to protect its brand name and domain from phishing: they would register their domain with DNSTwister, and then get notified if someone registers a look-alike domain that could send emails, impersonate them, etc.</span></p>
<p><span style="color: #000000;">More details: </span><a href="https://dnstwister.report/guides/prevent-typosquatting-phishing-emails?utm_source=chatgpt.com">DNSTwister.report</a></p>
<p>&nbsp;</p>
<p><span style="color: #000000;"><strong>2. typosquatting-finder.circl.lu</strong></span></p>
<p><span style="color: #000000;">typosquatting-finder.circl.lu is a <strong>free, public service</strong> provided by <strong>CIRCL</strong> (Computer Incident Response Center Luxembourg) to check whether there are existing typo-squatted domains for a given domain.</span></p>
<p><span style="color: #000000;">It’s designed for quick assessment: you enter a domain, and it shows potentially similar (typo) domains.</span></p>
<p><span style="color: #000000;"><strong>Typosquatting-finder</strong> tries to resolve DNS data (IP, NS, MX) to see which domains are actually registered or resolvable. On the web interface it will show the permutation, IP address, name servers, mail servers, web title, similarity metrics, … depending on what it can find.</span></p>
<p><span style="color: #000000;">More details:</span> <a href="https://typosquatting-finder.circl.lu/about">Typo-Squatting</a></p>
<p>&nbsp;</p>
<p><span style="color: #000000;"><strong>3. havebeensquatted.com</strong></span></p>
<p><span style="color: #000000;">Have I Been Squatted is a more fully-featured typosquatting detection and <strong>domain monitoring</strong> platform.</span></p>
<p><span style="color: #000000;">Its goal is to help individuals and organizations <strong>uncover typosquatting</strong>, but also to provide continuous protection: not just “are there similar domains now,” but “are there malicious or risky domains being registered and changed over time.”</span></p>
<p><span style="color: #000000;">More details: </span><a href="https://docs.haveibeensquatted.com/">Have I Been Squatted Documentation — Have I Been Squatted Docs</a></p>
<p>&nbsp;</p>
<p><span style="color: #000000;">Typosquatting attacks are a simple but effective form of digital impersonation that exploit small typing mistakes to lure users onto fraudulent websites.</span></p>
<p><span style="color: #000000;"> Even though the technique is low-tech, the impact can be serious, ranging from stolen credentials to malware infections or brand damage.</span></p>
<p><span style="color: #000000;"><strong>Recommendations to protect against Typosquatting attacks:</strong></span></p>
<ul>
<li><span style="color: #000000;">Organizations should regularly scan for look-alike domains</span></li>
<li><span style="color: #000000;">Use tools that detect suspicious registrations, and educate users about checking URLs carefully.</span></li>
<li><span style="color: #000000;">Monitoring MX Records to Thwart Phishing Emails</span></li>
<li><span style="color: #000000;">Quarantine Incoming Emails from Typo squatting Domains</span></li>
<li><span style="color: #000000;">Request takedowns of the Typo squatting domains</span></li>
</ul>
<p>&nbsp;</p>
<p><span style="color: #000000;">In the end, typo squatting reminds us that even minor lapses in attention can create real security risks, and staying vigilant is a key part of staying safe online.</span></p>
<p><span style="color: #000000;">Always verifying the URL or domain name before you connect to it is the safest way to prevent it.</span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/best-osint-tools-to-investigate-typo-squatting-domains/">Best OSINT tools to investigate Typo squatting domains</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">982</post-id>	</item>
		<item>
		<title>Top Free Threat Intelligence Feeds for SOC</title>
		<link>https://www.osintafrica.net/top-free-threat-intelligence-feeds-for-soc/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-free-threat-intelligence-feeds-for-soc</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Thu, 27 Nov 2025 20:10:26 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=968</guid>

					<description><![CDATA[<p>In today’s cyber-threat environment, a SOC (Security Operations Center) cannot rely solely on internal logs...</p>
<p>The post <a href="https://www.osintafrica.net/top-free-threat-intelligence-feeds-for-soc/">Top Free Threat Intelligence Feeds for SOC</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;">In today’s cyber-threat environment, a SOC (Security Operations Center) cannot rely solely on internal logs or ad-hoc detection rules. Attackers continuously evolve, use new malware, phishing campaigns, command-and-control (C2) infrastructures, and exploit zero-day vulnerabilities. To keep pace, security teams need access to fresh, actionable intelligence about malicious IPs, domains, URLs, file hashes, and campaign data. This is where Threat Intelligence Feeds come into play. By feeding a stream of indicators of compromise (IOCs) and threat metadata into detection tools (e.g. SIEM, IDS/IPS, EDR), SOCs gain proactive visibility enabling rapid detection, triage, and response long before threats fully materialize.</span></p>
<p><span style="color: #000000;">Below I describe several prominent public community-based feeds what they offer, their strengths, and how a SOC might benefit from them.</span><strong> </strong></p>
<h4><span style="color: #000000;"><strong>AlienVault OTX (Open Threat Exchange)</strong></span></h4>
<ul>
<li><span style="color: #000000;">AlienVault OTX is a crowd-sourced threat-sharing platform. Through OTX, thousands of threat researchers and security professionals worldwide share IOCs and threat reports.</span></li>
<li><span style="color: #000000;">OTX publishes “Pulses” structured reports containing one or more IOCs (IPs, domains, URLs, file hashes, etc.), metadata about the threat (e.g. targeted software, malicious behavior, CVE references), and contextual information (who reported it, reliability indicators, descriptions).</span></li>
<li><span style="color: #000000;">For SOCs and security teams, OTX offers free access (registration required). Data can be consumed via API, STIX/TAXII exports or integrated into third-party security tools.</span></li>
<li><span style="color: #000000;">The collaborative nature of OTX helps democratize threat intelligence: even smaller organizations or teams with limited budgets can benefit from threat data comparable to that used by larger enterprises.</span></li>
</ul>
<p><span style="color: #000000;"><strong>Use-Case for SOC</strong>: Integrate OTX pulses into your SIEM to enrich alerts automatically. Use IOCs from OTX to flag suspicious traffic or files, and subscribe to pulses relevant to your industry or region for early warning.</span></p>
<p><span style="color: #000000;">Link</span>: <a href="https://otx.alienvault.com/">https://otx.alienvault.com</a></p>
<p>&nbsp;</p>
<h4><span style="color: #000000;">abuse.ch</span></h4>
<ul>
<li><span style="color: #000000;">abuse.ch is a long-standing, community-driven threat intelligence provider dedicated to tracking malware, botnets, and malicious infrastructure.</span></li>
<li data-start="2651" data-end="3005"><span style="color: #000000;">Their offering includes multiple specialized feeds (platforms): among them <strong data-start="2726" data-end="2737">URLhaus</strong> (malicious URLs used for malware distribution), <strong data-start="2786" data-end="2803">MalwareBazaar</strong> (sharing confirmed malware samples), <strong data-start="2841" data-end="2854">ThreatFox</strong> (IOCs related to malware campaigns), <strong data-start="2892" data-end="2903">YARAify</strong> (repository of YARA rules), C2/botnet trackers, and others.</span></li>
<li data-start="3008" data-end="3266"><span style="color: #000000;">The feeds are designed to be machine-readable and easily consumed by SIEMs, TIPs (Threat Intelligence Platforms), or SOC pipelines, facilitating automation of alert enrichment, threat detection, and triage workflows.</span></li>
<li data-start="3269" data-end="3515"><span style="color: #000000;">Because abuse.ch is community-driven and shares many kinds of artefacts (URLs, hashes, SSL certificates, etc.), it provides high value especially for malware detection, IOC enrichment, and threat hunting.</span></li>
</ul>
<p data-start="3517" data-end="3797"><span style="color: #000000;"><strong data-start="3517" data-end="3537">Use-Case for SOC</strong>: Ingest URLhaus and ThreatFox feeds into your detection stack to flag malicious URLs or file hashes. Use MalwareBazaar to compare suspicious files against known malware. Use YARAify’s YARA rules to scan endpoints or network traffic for known malware patterns.</span></p>
<p><span style="color: #000000;">Link:</span> <a href="https://abuse.ch/">https://abuse.ch</a></p>
<p>&nbsp;</p>
<h4><span style="color: #000000;"><strong>SOCRadar Free Edition</strong></span></h4>
<ul>
<li><span style="color: #000000;">SOCRadar is a commercial and platform-oriented threat intelligence service. It offers modules for external attack surface monitoring, dark-web monitoring, brand protection, and importantly <strong data-start="4009" data-end="4046">IOC enrichment &amp; SOAR integration</strong>, which suits SOC workflows.</span></li>
<li data-start="4119" data-end="4407"><span style="color: #000000;">Their “IOC Radar” feature aggregates signals across multiple public feeds (including abuse.ch, OTX, URLhaus etc.) to give an aggregated risk assessment per IP and domain and observable helpful to prioritize which alerts deserve immediate attention.</span></li>
<li data-start="4410" data-end="4553"><span style="color: #000000;">This approach helps reduce the noise and signal-to-noise ratio when dealing with many overlapping public feeds a common challenge for SOCs.</span></li>
</ul>
<p data-start="4555" data-end="4773"><span style="color: #000000;"><strong data-start="4555" data-end="4575">Use-Case for SOC</strong>: Use SOCRadar to centralize and correlate IOCs from multiple sources, triage and score threats, and feed high-confidence events into your SOAR or incident response pipelines for efficient handling.</span></p>
<p><span style="color: #000000;">Link:</span> <a href="https://socradar.io/">https://socradar.io</a></p>
<p>&nbsp;</p>
<h4><strong> </strong><span style="color: #000000;"><strong>CIRCL (Computer Incident Response Center Luxembourg)</strong></span></h4>
<ul>
<li><span style="color: #000000;">CIRCL is a CERT and CSIRT organization which among other services provides threat intelligence and OSINT-based feeds.</span></li>
<li data-start="5000" data-end="5229"><span style="color: #000000;">Their focus includes the operation of a MISP-based sharing platform and providing historical DNS-record data, dynamic malware analysis, and community-based sharing of threat intelligence.</span></li>
<li data-start="5232" data-end="5415"><span style="color: #000000;">For SOCs, feeds from CIRCL and TLP can serve as a source of vetted, quality intelligence especially useful for Europe-centric threat context, or for industries where CIRCL has visibility.</span></li>
</ul>
<p data-start="5417" data-end="5635"><span style="color: #000000;"><strong data-start="5417" data-end="5437">Use-Case for SOC</strong>: Integrate CIRCL’s MISP feeds or DNS-history feeds to enrich internal alerts, trace domain history, or conduct retrospective investigations when dealing with targeted attacks or persistent threats</span></p>
<p><span style="color: #000000;">Link:</span> <a href="https://www.circl.lu/">https://www.circl.lu</a></p>
<p>&nbsp;</p>
<h4><span style="color: #000000;"><strong>OpenPhish</strong></span></h4>
<ul>
<li><span style="color: #000000;">OpenPhish is a specialized service focusing on <strong data-start="5706" data-end="5741">automated phishing intelligence</strong> for detection and listing of active phishing URLs and domains.</span></li>
<li data-start="5852" data-end="6127"><span style="color: #000000;">For SOCs, phishing remains one of the most persistent initial vectors for compromise. Having access to an up-to-date feed of phishing URLs and domains helps detect and block phishing attempts before they reach users, or flag suspicious inbound traffic for further inspection.</span></li>
</ul>
<p data-start="6129" data-end="6364"><span style="color: #000000;"><strong data-start="6129" data-end="6149">Use-Case for SOC</strong>: Use OpenPhish feed in your email gateway, proxy, or web gateway to block or monitor access to known phishing domains. Enrich email-security logs to detect possible phishing victims or attempted phishing campaigns.</span></p>
<p><span style="color: #000000;">Link</span>: <a href="https://openphish.com/">https://openphish.com</a></p>
<p>&nbsp;</p>
<h4><span style="color: #000000;"><strong>Spamhaus</strong></span></h4>
<ul>
<li><span style="color: #000000;">Spamhaus is a long-established organization maintaining blocklists and threat intelligence data for spam, botnets, malware infrastructure, and more.</span></li>
<li data-start="6611" data-end="6856"><span style="color: #000000;">Importantly, the real-time feeds produced by abuse.ch are now offered via Spamhaus Technology’s infrastructure meaning better reliability, performance, and integration support for enterprises and SOCs.</span></li>
<li data-start="6859" data-end="7081"><span style="color: #000000;">Beyond abuse.ch data, Spamhaus provides other threat data (IP and domain reputation, passive DNS, etc.) that can add complementary context to SOC investigation and detection workflows.</span></li>
</ul>
<p data-start="7083" data-end="7330"><span style="color: #000000;"><strong data-start="7083" data-end="7103">Use-Case for SOC</strong>: Combine Spamhaus blocklists (IP, domain, DNS) with other feeds to improve detection and prevent spam, malware distribution, botnet communication. Use passive DNS data for infrastructure tracking and historical investigations.</span></p>
<p><span style="color: #000000;">Link</span>: <a href="https://www.spamhaus.org/">https://www.spamhaus.org</a></p>
<p>&nbsp;</p>
<h4><span style="color: #000000;"><strong>How SOCs Benefit from Threat Intelligence Feeds: Key Advantages &amp; Best Practices</strong></span></h4>
<ul>
<li><span style="color: #000000;"><strong>Faster Detection &amp; Response</strong>: By integrating external IOCs into SIEM, EDR or IDS/IPS, SOCs can detect malicious activity e.g. communication with known bad IPs, domain resolution to suspicious domains, or file hashes immediately.</span></li>
<li><span style="color: #000000;"><strong>Enrichment &amp; Context</strong>: Alerts enriched with threat metadata (e.g. threat actor, malware family, attack vectors) help analysts prioritize incidents, reduce false positives, and make informed decisions.</span></li>
<li><span style="color: #000000;"><strong>Proactive Threat Hunting</strong>: Feeds help SOCs identify emerging threats before they hit their network e.g. new malware variants, C2 servers, phishing campaigns giving time to patch, block or monitor.</span></li>
<li><span style="color: #000000;"><strong>Shared Community Intelligence</strong>: Community-driven platforms like OTX and abuse.ch democratize threat intelligence even organizations without large budgets can benefit from global collective defense.</span></li>
<li><span style="color: #000000;"><strong>Automation &amp; Integration</strong>: Many feeds support standard formats (STIX, TAXII, JSON, CSV), making it easier to integrate into SOC toolchains, SIEMs, SOAR, TIPs.</span></li>
<li><span style="color: #000000;"><strong>Historical &amp; Forensic Analysis</strong>: Feeds that include historical DNS data, past IOCs or archived samples help in retrospective investigations and understanding attacker infrastructure over time (especially relevant for persistent and advanced threats).</span></li>
</ul>
<h4><span style="color: #000000;"><strong>Best Practices:</strong></span></h4>
<ul>
<li><span style="color: #000000;">Use multiple complementary feeds (e.g. OTX + abuse.ch + OpenPhish + blocklists) rather than relying on a single source  this reduces blind spots.</span></li>
<li><span style="color: #000000;">Carefully tune ingestion and alerting to avoid “noise overload”; not every IOC warrants immediate action  incorporate risk scoring and context-based prioritization.</span></li>
<li><span style="color: #000000;">Regularly review and update feeds, and validate IOCs (e.g. cross-check across multiple sources) to avoid false positives.</span></li>
<li><span style="color: #000000;">Combine external intelligence with internal telemetry (endpoint logs, network flows, email logs) for better detection accuracy.</span></li>
</ul>
<h4><span style="color: #000000;"><strong>Conclusion</strong></span></h4>
<p><span style="color: #000000;">Threat intelligence feeds are an essential pillar for any modern SOC. As attackers increasingly rely on automation, broad infrastructure, and rapidly changing techniques, relying solely on internal logs or legacy detection rules is no longer sufficient. By leveraging open and community-driven platforms like AlienVault OTX, abuse.ch, CIRCL, OpenPhish and Spamhaus, a SOC can gain a powerful advantage: <strong>timely, actionable, and context-rich intelligence</strong> about malware, phishing, C2 infrastructure, domain reputation, and more.</span></p>
<p><span style="color: #000000;">Integrating these feeds into your SOC’s SIEM, EDR, SOAR, or TIP drastically improves detection speed, reduces time-to-response, enables proactive threat hunting, and strengthens overall cyber-defense posture especially for organizations with limited resources.</span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/top-free-threat-intelligence-feeds-for-soc/">Top Free Threat Intelligence Feeds for SOC</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">968</post-id>	</item>
		<item>
		<title>Best WordPress website scanner for free</title>
		<link>https://www.osintafrica.net/best-wordpress-website-scanner-for-free/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=best-wordpress-website-scanner-for-free</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Sat, 22 Nov 2025 15:17:34 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=943</guid>

					<description><![CDATA[<p>WordPress is a popular, user-friendly platform for building websites and blogs. Think of it as...</p>
<p>The post <a href="https://www.osintafrica.net/best-wordpress-website-scanner-for-free/">Best WordPress website scanner for free</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>WordPress is a popular, user-friendly platform for building websites and blogs. Think of it as a tool that lets you create and manage a website without needing to know much (or any) coding.</p>
<p>WordPress websites are the most targeted websites, the best way to protect your website is to scan it regularly to detect any exploited vulnerability.</p>
<p>Below, we will share with you the best WordPress website scanner for freely available online.</p>
<ol>
<li><a href="https://pentest-tools.com/cms-vulnerability-scanning/wordpress-scanner-online-wpscan/scans/rmCAlipwoISMuQtG?view_report=true">Free WordPress Scanner Report (Light) &#8211; Pentest-Tools.com</a></li>
</ol>
<p><strong>Pentest-Tools.com</strong> is a <strong>legitimate and quite powerful platform</strong> for automated, semi-automated, and continuous pentesting. It&#8217;s especially useful for security teams who want:</p>
<ul>
<li>automated vulnerability assessments,</li>
<li>verified (exploitable) findings,</li>
<li>continuous scanning,</li>
<li>streamlined reporting.</li>
</ul>
<p><strong>The tool has a dedicated option to scan WordPress website and provide a report:</strong></p>
<p><a href="https://pentest-tools.com/cms-vulnerability-scanning/wordpress-scanner-online-wpscan">WordPress Vulnerability Scanner with WPScan &#8211; Pentest-Tools.com</a></p>
<p><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/11/wp-1.png?resize=640%2C304&#038;ssl=1" alt="" width="640" height="304" /></p>
<p>2. <a href="https://sitecheck.sucuri.net/">Website Security Checker | Malware Scan | Sucuri SiteCheck</a></p>
<p><strong>Sucuri SiteCheck</strong> is a <strong>free remote website-security scanner</strong> provided by Sucuri Inc.</p>
<p>The tool can be used to detect if the site is running an outdated CMS (like WordPress, Joomla, Drupal, Magento) or vulnerable plugins/extensions.</p>
<p>By inputing a URL (for example “example.com”), and SiteCheck will scan the site’s <strong>publicly visible source code</strong> for signs of malware, viruses, malicious code like suspicious iframes/JavaScript/redirects.</p>
<p>The tool is a perfect match for those who want to check their WP website.</p>
<p><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/11/wp-2.png?resize=640%2C298&#038;ssl=1" alt="" width="640" height="298" /></p>
<p>3. <a href="https://wpsafe.ai/sitecheck/">Site Check &#8211; WP Safe AI</a></p>
<p><strong>wpsafe.ai/sitecheck</strong> is a service from <strong>WPSafe.ai</strong> that offers a free website security scan, especially geared toward WordPress sites.</p>
<p><strong>The tool can help identify the following issues:</strong></p>
<p>You enter a URL, and the SiteCheck tool scans the <em>public-facing</em> source code of the site for signs of malware, viruses, and other malicious code.</p>
<ul>
<li>It checks for blacklisting by security authorities (e.g. Google, PhishTank).</li>
<li>It can identify out-of-date CMS software, plugins, or extensions.</li>
<li>It also reports on general security issues, configuration anomalies, and gives recommendations.<img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/11/wp-3.png?resize=640%2C298&#038;ssl=1" alt="" width="640" height="298" /></li>
</ul>
<p>4. <a href="https://hackertarget.com/wordpress-security-scan/">WordPress Security Scan | HackerTarget.com</a></p>
<p>The <a style="color: #000000;" href="https://hackertarget.com/wordpress-security-scan/?utm_source=chatgpt.com"><strong>WordPress Security Scan</strong> on <strong>HackerTarget.com</strong></a> is a tool for externally checking WordPress sites for common vulnerabilities and misconfigurations.</p>
<p>Here’s a breakdown of what it is, how it works, and its pros &amp; limitations:</p>
<p>F<strong>ree Passive Scan</strong></p>
<ul>
<li>For free users, it runs a “low-impact” test: the scanner downloads a few publicly accessible pages from your site and analyzes the raw HTML.</li>
<li>It looks for: WordPress core version, detectable plugins/themes (from the HTML), potential directory indexing, JS or iframes, and whether Google Safe Browsing flags the site.</li>
<li>It tries to enumerate up to the first 2 WordPress users.</li>
<li>It also checks if “directory indexing” (i.e. file listing) is enabled on key locations.</li>
<li>It gives a “site reputation” check (e.g. via Google Safe Browsing).</li>
</ul>
<p><strong>More Aggressive / Advanced Scanning (Paid / Membership)</strong></p>
<ul>
<li>If you pay / have a membership, the tool can run <strong>Nmap NSE scripts</strong> tailored for WordPress to enumerate plugins, themes, and users more thoroughly.</li>
<li>It can use <strong>WPScan</strong> (a well-known WP vulnerability scanner) under the hood.</li>
<li>With membership you also get other vulnerability tools like <strong>OpenVAS</strong> and <strong>Nikto</strong> to scan the server / WordPress for deeper issues.</li>
<li>It can “fingerprint” plugin/theme versions and check them against a database of known vulnerable versions.</li>
<li>You can do user-enumeration (finding user names) more thoroughly (up to 50 users).</li>
</ul>
<p><strong>Purpose &amp; Use Cases</strong></p>
<ul>
<li>Designed to give a <strong>high-level security posture</strong> of a WordPress site from the outside (i.e. what an attacker remote to your site might see).</li>
<li>Helps identify “attack surface”: by knowing which plugins/themes are present, which users exist, etc., you can better understand possible entry points.</li>
<li>Useful as a <strong>first step</strong> or reconnaissance tool before doing more in-depth testing or a full security audit.</li>
</ul>
<p><strong>Limitations / Things to Be Careful About</strong></p>
<ul>
<li>The <strong>free scan is passive</strong>, so it doesn’t try to brute-force anything or deeply probe — it’s limited.</li>
<li>Aggressive enumeration (when you use Nmap / WPScan via membership) <em>can</em> generate a lot of HTTP 404s and might show up in your access logs or trigger security measures on the server.</li>
<li>Because the scan is external, it <strong>cannot see server-side backdoors</strong>, malware in the database, or deeply embedded malicious code that doesn’t manifest in the public HTML.</li>
<li>It’s not a <em>replacement</em> for a full penetration test or manual security audit — it gives you an “outsider’s view,” not everything.</li>
</ul>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/11/wp-4.png?resize=640%2C349&#038;ssl=1" alt="" width="640" height="349" /></p>
<p>5. <a href="https://wpsec.com/">Online WordPress Security Scan for Vulnerabilities | WP Sec</a></p>
<p>WPSEC.com (sometimes written WPSec) is a web service that provides WordPress vulnerability scanning. Here’s a breakdown of what it is, how it works, and what its pros/limitations are:</p>
<p><strong>WordPress Security Scanner</strong></p>
<ul>
<li>WPSEC.com lets you scan a WordPress site (even without having WP-admin access) to check for known vulnerabilities.</li>
<li>It uses a “deep scan” technology based on <strong>WPScanner</strong> plus its own custom scanning algorithms.</li>
<li>It maintains a database of known WordPress bugs, core issues, plugin vulnerabilities, and “security features” to compare against.</li>
</ul>
<p><strong>Plans / Pricing</strong></p>
<ul>
<li><strong>Free Plan</strong>: You can scan <strong>1 WordPress site</strong>, get up to <strong>20 scan reports</strong>, and schedule <strong>weekly or monthly</strong></li>
<li><strong>Premium Plan</strong> (~€39 / month): Includes unlimited scan locations, unlimited reports, email notifications, more advanced dashboard &amp; reports, and daily scans.</li>
<li><strong>White-Label Plan</strong> (for companies): Offers branded scanning, custom domain, design, unlimited scans &amp; reports.</li>
</ul>
<p><strong>Features / Functionality</strong></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>Instant Scans</strong>: You can run one-off scans quickly via their “instant scan” feature.</li>
<li><strong>Automated Scheduled Scans</strong>: With a registered account, you can set scans to run daily, weekly, or monthly.</li>
<li><strong>Dashboard</strong>: If you manage multiple WP sites, you can see them all in one place and track which sites are more vulnerable.</li>
</ul>
</li>
</ul>
<ul>
<li><strong>Push Notifications</strong>: They support email notifications and webhooks, so you can be alerted when vulnera<code></code>bilities are found.</li>
<li><strong>API / Webhooks</strong>: For premium customers, they even offer a JSON-webhook API to integrate scan results with other tools (e.g., Slack, your own dashboards).</li>
</ul>
<p><strong>Vulnerability Reporting Program</strong></p>
<ul>
<li>They have a <strong>responsible disclosure program</strong>: security researchers can report vulnerabilities in WPSEC’s own site or services.</li>
<li>They provide a PGP key for secure reporting of bugs.</li>
</ul>
<p><strong>Blog / Educational Content</strong></p>
<ul>
<li>WPSec maintains a blog where they publish about new WordPress vulnerabilities, security best practices, and bug reports.</li>
<li>They also write about how site-owners can harden their WordPress installations.</li>
</ul>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/11/wp-5.png?resize=640%2C270&#038;ssl=1" alt="" width="640" height="270" /></p>
<p>If you never scan your Word Press website, its the time for you to do it.</p>
<p><span id="more-943"></span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/best-wordpress-website-scanner-for-free/">Best WordPress website scanner for free</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">943</post-id>	</item>
		<item>
		<title>Fake Microsoft Teams website to deliver malware</title>
		<link>https://www.osintafrica.net/fake-microsoft-teams-website-to-deliver-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fake-microsoft-teams-website-to-deliver-malware</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Tue, 30 Sep 2025 18:25:40 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<category><![CDATA[Fake Microsoft Teams]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[teams-download.top]]></category>
		<category><![CDATA[teams-install]]></category>
		<category><![CDATA[teams-install.top]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=932</guid>

					<description><![CDATA[<p>The threat actors have created many fake websites mimicking the legitimate Microsoft website https://www.microsoft.com/en-us/microsoft-teams/download-app to...</p>
<p>The post <a href="https://www.osintafrica.net/fake-microsoft-teams-website-to-deliver-malware/">Fake Microsoft Teams website to deliver malware</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;">The threat actors have created many fake websites mimicking the legitimate Microsoft website</span> <a href="https://www.microsoft.com/en-us/microsoft-teams/download-app">https://<strong>www.microsoft.com</strong>/en-us/microsoft-teams/download-app</a> <span style="color: #000000;">to trick the users to download a known legitimate Microsoft Teams application.</span></p>
<p><span style="color: #000000;">We observed a couple of such domains registered:</span></p>
<p><span style="color: #000000;">teams-download[.]us</span><br />
<span style="color: #000000;">teams-install[.]top</span></p>
<p><span style="color: #000000;">teams-install[.]run</span></p>
<p><span style="color: #000000;">teams-install[.]icu</span></p>
<p><span style="color: #000000;">teams-download[.]buzz</span></p>
<p><span style="color: #000000;">teams-download[.]top</span></p>
<p><span style="color: #000000;">At the time of writing, the domains are not accessible. However, we were able to see how each website looked like before it was shutdown.</span></p>
<p><a href="https://urlscan.io/search/#hash%3A32504ba1306184a6570582c08c1dbd61712d8e09a6a15d1c3e8e54e16de70f0f">https://urlscan.io/search/#hash%3A32504ba1306184a6570582c08c1dbd61712d8e09a6a15d1c3e8e54e16de70f0f</a></p>
<p><span style="color: #000000;">Knowing that most of the Microsoft legitimate domains are registered under.</span></p>
<p><span style="color: #000000;">It is obviously visible that none of the domains belong to Microsoft. The domains are newly created one.</span></p>
<p><span style="color: #000000;">To prove our assumption, we compared legitimate Microsoft domain to the fake one:</span></p>
<p><span style="color: #000000;"><strong>Legitimate one:</strong></span></p>
<p><a href="https://whois.domaintools.com/microsoft.com">https://whois.domaintools.com/microsoft.com</a></p>
<p><span style="color: #000000;">Registrant Organization: Microsoft Corporation</span><br />
<span style="color: #000000;">Registrant Street: One Microsoft Way, </span><br />
<span style="color: #000000;">Registrant City: Redmond</span><br />
<span style="color: #000000;">Registrant State/Province: WA</span><br />
<span style="color: #000000;">Registrant Postal Code: 98052</span><br />
<span style="color: #000000;">Registrant Country: US</span></p>
<p><span style="color: #000000;">Registrant Email: </span><br />
<span style="color: #000000;">Tech Name: MSN Hostmaster</span><br />
<span style="color: #000000;">Tech Phone: +1.4258828080</span><br />
<span style="color: #000000;">Tech Email: </span></p>
<p><span style="color: #000000;"><strong>Fake one:</strong></span></p>
<p><span style="color: #000000;">The registrant is not Microsoft</span></p>
<p><a href="https://whois.domaintools.com/teams-download.top">https://whois.domaintools.com/teams-download.top</a>.</p>
<p><span style="color: #000000;">To conclude, based on the findings, we may confirm that the domains are targeting Microsoft customers to download fake Microsoft Teams which could be used to compromise the system.</span></p>
<p><span style="color: #000000;">We recommend each company to verify those domains in their network to be stay safe.</span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/fake-microsoft-teams-website-to-deliver-malware/">Fake Microsoft Teams website to deliver malware</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">932</post-id>	</item>
		<item>
		<title>Best online Sandbox to analyse a malware</title>
		<link>https://www.osintafrica.net/best-online-sandbox-to-analyse-a-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=best-online-sandbox-to-analyse-a-malware</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Sat, 05 Jul 2025 11:06:50 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=924</guid>

					<description><![CDATA[<p>A system is like a human; it can get infected and it needs to be...</p>
<p>The post <a href="https://www.osintafrica.net/best-online-sandbox-to-analyse-a-malware/">Best online Sandbox to analyse a malware</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;">A system is like a human; it can get infected and it needs to be isolated to analyze to avoid infecting others systems.</span></p>
<p><span style="color: #000000;">Imagine a person infected with a virus that can contaminate others; to avoid any contamination, we need to isolate him or her so that we and consult to find out the root cause and provide a preventive measure so that the virus won’t infect others people.</span></p>
<p><span style="color: #000000;">A malware infected a system behaves the same way. to protect others system, we need to isolate it and analyze it to find the root cause and provide a preventive solution so we can detect such malware in the future.</span></p>
<p><span style="color: #000000;">So, what is a malware?</span></p>
<p><span style="color: #000000;">A malware is any executable file, application, process or sub process or any binary file that after running on a system will behave inappropriate to steal credential, have a persistency method, command and control method, privilege escalation and so on.</span></p>
<p><span style="color: #000000;">To understand that an executable file, an application, a process or any binary is a malware, we need to analyze it in a secure environment to not spread it or compromise our production environment.</span></p>
<p><span style="color: #000000;">In the past we used to configure our own Sandbox to analyze a malware, but nowadays, we do not need it anymore, we have many online Sandbox solution with all the features needed to do that for us.</span></p>
<p><span style="color: #000000;">Let’s share the tools with you.</span></p>
<ol>
<li><a href="https://www.virustotal.com/gui/home/upload">https://www.virustotal.com/gui/home/upload</a></li>
</ol>
<p><span style="color: #000000;">A multi‑engine malware and URL scanning platform, now part of Google&#8217;s Chronicle since 2018. It aggregates over 70+ antivirus engines, URL scanners, and threat intelligence sources, allowing users to upload files or submit URLs for analysis. You can submit via the web interface, desktop tools, browser extensions, email, or API. Free users have limits, while premium tiers unlock enhanced features.</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-929" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/VT.png?resize=640%2C304&#038;ssl=1" alt="" width="640" height="304" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/VT.png?resize=1024%2C487&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/VT.png?resize=300%2C143&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/VT.png?resize=768%2C365&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/VT.png?w=1269&amp;ssl=1 1269w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ol start="2">
<li><a href="https://www.joesandbox.com/#windows">https://www.joesandbox.com/#windows</a></li>
</ol>
<p><span style="color: #000000;">A versatile malware and phishing analysis solution that supports both cloud-based and on-premise deployment. It enables deep static, dynamic, and hybrid analysis of malicious files and URLs across multiple operating systems such as Windows, macOS, Linux, Android, and even iOS.</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-928" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/joe-sandbox.png?resize=640%2C294&#038;ssl=1" alt="" width="640" height="294" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/joe-sandbox.png?resize=1024%2C470&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/joe-sandbox.png?resize=300%2C138&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/joe-sandbox.png?resize=768%2C352&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/joe-sandbox.png?w=1314&amp;ssl=1 1314w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ol start="3">
<li><a href="https://hybrid-analysis.com/">https://hybrid-analysis.com/</a></li>
</ol>
<p><span style="color: #000000;">A free, community-driven malware sandbox powered by Payload Security and Falcon Sandbox, integrating multiple detection engines such as static, dynamic, and ML to analyze files and URLs for malicious behavior.</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-927" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/hybrid-ana.png?resize=640%2C320&#038;ssl=1" alt="" width="640" height="320" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/hybrid-ana.png?resize=1024%2C512&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/hybrid-ana.png?resize=300%2C150&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/hybrid-ana.png?resize=768%2C384&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/hybrid-ana.png?w=1359&amp;ssl=1 1359w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/hybrid-ana.png?w=1280&amp;ssl=1 1280w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ol start="4">
<li><a href="https://app.any.run/">https://app.any.run/</a></li>
</ol>
<p><span style="color: #000000;">An interactive cloud-based malware sandbox. Unlike automated sandboxes, it lets you manually interact with the VM to drive the sample, enabling macros, clicking dialogs while capturing real-time behavior and indicators.</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-926" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/app-any-run.png?resize=640%2C269&#038;ssl=1" alt="" width="640" height="269" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/app-any-run.png?resize=1024%2C431&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/app-any-run.png?resize=300%2C126&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/app-any-run.png?resize=768%2C323&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/app-any-run.png?w=1287&amp;ssl=1 1287w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ol start="5">
<li><a href="https://www.filescan.io/scan">https://www.filescan.io/scan</a></li>
</ol>
<p><span style="color: #000000;">A free online malware analysis service, the tool lets you upload files or submit URLs. It checks them with emulation engines, extracts indicators of compromise (IOCs), examines certificates, and checks for phishing and malicious behaviors.</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-925" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/filescan.png?resize=640%2C313&#038;ssl=1" alt="" width="640" height="313" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/filescan.png?resize=1024%2C501&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/filescan.png?resize=300%2C147&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/filescan.png?resize=768%2C376&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/07/filescan.png?w=1299&amp;ssl=1 1299w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>&nbsp;</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/best-online-sandbox-to-analyse-a-malware/">Best online Sandbox to analyse a malware</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">924</post-id>	</item>
		<item>
		<title>How to use AbuseIPDB</title>
		<link>https://www.osintafrica.net/how-to-use-abuseipdb/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-use-abuseipdb</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Wed, 11 Jun 2025 19:46:18 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<category><![CDATA[AbuseIPDB]]></category>
		<category><![CDATA[AbuseIPDB seearch]]></category>
		<category><![CDATA[How to use AbuseIPDB]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=904</guid>

					<description><![CDATA[<p>AbuseIPDB ia a third-party tool that provide a centralize database to report IP addresses that...</p>
<p>The post <a href="https://www.osintafrica.net/how-to-use-abuseipdb/">How to use AbuseIPDB</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;">AbuseIPDB ia a third-party tool that provide a centralize database to report IP addresses that were used to abuse different companies or organizations.</span></p>
<p><span style="color: #000000;">The information about the malicious or suspicious IP addresses are coming from different sources such as Firewall, Proxies, Routers, Honeypots, Sandboxes or any sources use to monitors or detect malicious IP addresses.</span></p>
<p><span style="color: #000000;">The tool is accessible by clicking on the link:</span> <a href="https://www.abuseipdb.com">https://www.abuseipdb.com</a></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-905" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/1.png?resize=640%2C254&#038;ssl=1" alt="" width="640" height="254" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/1.png?resize=1024%2C406&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/1.png?resize=300%2C119&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/1.png?resize=768%2C305&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/1.png?w=1278&amp;ssl=1 1278w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>&nbsp;</p>
<p><span style="color: #000000;">Like you see, once the link is opened, 10 menus are available to your view, each of them has a different capability.</span></p>
<p><span style="color: #000000;">The first menu “Home” is the main page, the page contains the search menu to search information about IP addresses, Domain names or Subnets.</span></p>
<p><span style="color: #000000;">Let’s have a look at one example:</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-906" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/2.png?resize=640%2C322&#038;ssl=1" alt="" width="640" height="322" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/2.png?resize=1024%2C515&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/2.png?resize=300%2C151&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/2.png?resize=768%2C386&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/2.png?w=1171&amp;ssl=1 1171w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>&nbsp;</p>
<p><span style="color: #000000;">Like you see, we entered the IP address <strong>117.199.172.28</strong>, the IP address was found in the database, which means that it was reported by someone.</span></p>
<p><span style="color: #000000;">Below, we can see that the IP address was reported 3 times of abuse and 24% of confidence.</span></p>
<p><span style="color: #000000;">On the picture, you may observe the details about the IP address such as:</span></p>
<p><span style="color: #000000;">The location, the owner, ASN number, the domain name associated to the IP address and the usage type.</span></p>
<p><span style="color: #000000;">By scrolling down, we may get more information about the entities that reported the IP address.</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-907" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-3.png?resize=640%2C328&#038;ssl=1" alt="" width="640" height="328" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-3.png?resize=1024%2C524&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-3.png?resize=300%2C153&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-3.png?resize=768%2C393&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-3.png?w=1140&amp;ssl=1 1140w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>&nbsp;</p>
<p><span style="color: #000000;">We can see on the picture, the reported name, the time it was reported and the comment about the reason it was reported.</span></p>
<p><span style="color: #000000;">That information helps us have better details about the IP address and make a recommendation to protect our environment.</span></p>
<p><span style="color: #000000;">You can click on WHOIS following with the IP address on the image to get more insight about it.</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-908" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-4.png?resize=640%2C203&#038;ssl=1" alt="" width="640" height="203" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-4.png?resize=1024%2C325&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-4.png?resize=300%2C95&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-4.png?resize=768%2C244&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-4.png?w=1162&amp;ssl=1 1162w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>&nbsp;</p>
<p><span style="color: #000000;">Result after clicking</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone wp-image-909" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-5.png?resize=600%2C416&#038;ssl=1" alt="" width="600" height="416" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-5.png?w=796&amp;ssl=1 796w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-5.png?resize=300%2C208&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-5.png?resize=768%2C533&amp;ssl=1 768w" sizes="(max-width: 600px) 100vw, 600px" /></p>
<p><span style="color: #000000;">If you wish to <strong>take down the IP address</strong>, you can scroll down and click on the button <strong>“takedown”</strong></span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-910" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-6.png?resize=640%2C66&#038;ssl=1" alt="" width="640" height="66" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-6.png?resize=1024%2C106&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-6.png?resize=300%2C31&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-6.png?resize=768%2C80&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-6.png?w=1031&amp;ssl=1 1031w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p><span style="color: #000000;">Feel the request form and submit to takedown the IP address.</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-911" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-7.png?resize=640%2C315&#038;ssl=1" alt="" width="640" height="315" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-7.png?resize=1024%2C504&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-7.png?resize=300%2C148&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-7.png?resize=768%2C378&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-7.png?w=1171&amp;ssl=1 1171w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p><span style="color: #000000;">Example of <strong>IP address takedown</strong></span> <a href="https://www.abuseipdb.com/blog/kv-solutions-takedown">https://www.abuseipdb.com/blog/kv-solutions-takedown</a></p>
<p><span style="color: #000000;">You can find the recent reported IP address by scrolling at the end of the page</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-912" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-8.png?resize=640%2C121&#038;ssl=1" alt="" width="640" height="121" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-8.png?resize=1024%2C194&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-8.png?resize=300%2C57&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-8.png?resize=768%2C145&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-8.png?w=1094&amp;ssl=1 1094w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p><span style="color: #000000;">In the second menu <strong>“Report IP”</strong></span></p>
<p><span style="color: #000000;">You can report an IP address an account.</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-913" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-9.png?resize=640%2C345&#038;ssl=1" alt="" width="640" height="345" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-9.png?resize=1024%2C552&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-9.png?resize=300%2C162&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-9.png?resize=768%2C414&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-9.png?w=1269&amp;ssl=1 1269w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p><span style="color: #000000;">On the third menu “<strong>Bulk Reported”</strong></span></p>
<p><span style="color: #000000;">If you wish to report a group of IP addresses, a bulk report is possible, more details:</span> <a href="https://www.abuseipdb.com/bulk-report"><strong>https://www.abuseipdb.com/bulk-report</strong></a></p>
<p><span style="color: #000000;"><strong> </strong><strong>On the fourth menus “Pricing”, “About”, “FAQ” are information related to the pricing, some details about the tool.</strong></span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone wp-image-914" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-10.png?resize=400%2C139&#038;ssl=1" alt="" width="400" height="139" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-10.png?resize=300%2C104&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-10.png?resize=768%2C266&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-10.png?w=928&amp;ssl=1 928w" sizes="(max-width: 400px) 100vw, 400px" /></p>
<p><span style="color: #000000;"><strong>The seventh menu</strong> “<strong>Documentation</strong>”, contains information about how the tool can be integrated with others platforms:</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone wp-image-915" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-11.png?resize=500%2C233&#038;ssl=1" alt="" width="500" height="233" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-11.png?resize=1024%2C478&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-11.png?resize=300%2C140&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-11.png?resize=768%2C358&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-11.png?w=1042&amp;ssl=1 1042w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p><span style="color: #000000;"><strong>The eighth menu “Statistics”</strong> contains information about IP addresses that have been reported. Scroll down to get more details.</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-916" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-12.png?resize=640%2C262&#038;ssl=1" alt="" width="640" height="262" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-12.png?resize=1024%2C419&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-12.png?resize=300%2C123&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-12.png?resize=768%2C314&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-12.png?w=1256&amp;ssl=1 1256w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p><span style="color: #000000;">The ninth menu “IP Tools” contains information about tools that can be used to perform some troubleshooting or get some details about IP addresses or DNS. Click on each of them to get more information.</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone wp-image-917" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-12-1.png?resize=500%2C205&#038;ssl=1" alt="" width="500" height="205" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-12-1.png?resize=1024%2C419&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-12-1.png?resize=300%2C123&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-12-1.png?resize=768%2C314&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-12-1.png?w=1256&amp;ssl=1 1256w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p><span style="color: #000000;"><strong>Example: Click on the sub menu “Ping IP”</strong></span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone wp-image-919 size-medium" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-14.png?resize=300%2C220&#038;ssl=1" alt="" width="300" height="220" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-14.png?resize=300%2C220&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-14.png?w=575&amp;ssl=1 575w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p><span style="color: #000000;">Like you see, the Ping failed on the IP address entered above.</span></p>
<p><span style="color: #000000;"><strong>The last menu “Contact”,</strong> contains information about how to contact<strong> AbuseIPDB</strong> team</span></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-920" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-15.png?resize=640%2C347&#038;ssl=1" alt="" width="640" height="347" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-15.png?resize=1024%2C555&amp;ssl=1 1024w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-15.png?resize=300%2C162&amp;ssl=1 300w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-15.png?resize=768%2C416&amp;ssl=1 768w, https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2025/06/how-to-use-abuseipdb-15.png?w=1165&amp;ssl=1 1165w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p><span style="color: #000000;">Feel free to feel the fields to get in touch with the team.</span></p>
<p><span style="color: #000000;">Like you see, <strong>AbuseIPDB</strong> is very powerful tool, the tool has menus features described above to get more details about IP addresses and DNS or others. The tool should be one of the main tools you use daily if you work in SOC.</span></p>
<p><span style="color: #000000;">You can watch the video version by clicking on the link:</span></p>
<div class="jetpack-video-wrapper"><iframe title="How to use abuseipdb" width="640" height="360" src="https://www.youtube.com/embed/p4JlGWRdXX8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
<p>&nbsp;</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/how-to-use-abuseipdb/">How to use AbuseIPDB</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">904</post-id>	</item>
		<item>
		<title>top AI-powered threat intelligence platforms</title>
		<link>https://www.osintafrica.net/top-ai-powered-threat-intelligence-platforms/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-ai-powered-threat-intelligence-platforms</link>
		
		<dc:creator><![CDATA[Bangaly Koita]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 13:34:40 +0000</pubDate>
				<category><![CDATA[Main News]]></category>
		<category><![CDATA[Anomaly Threat Stream]]></category>
		<category><![CDATA[IBM X-Force Exchange]]></category>
		<category><![CDATA[Mandiant Threat Intelligence]]></category>
		<category><![CDATA[Palo Alto Networks Cortex]]></category>
		<category><![CDATA[SOCRadar]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[ThreatQuotient]]></category>
		<guid isPermaLink="false">https://www.osintafrica.net/?p=901</guid>

					<description><![CDATA[<p>threat intelligence platforms   are designed to help organizations detect, analyze, and respond to cyber...</p>
<p>The post <a href="https://www.osintafrica.net/top-ai-powered-threat-intelligence-platforms/">top AI-powered threat intelligence platforms</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;"><strong>threat intelligence platforms</strong>   are designed to help organizations detect, analyze, and respond to cyber threats more effectively.</span></p>
<p><span style="color: #000000;">If you wish to learn more about Cyber Threat Intelligence, feel free to click on:</span> <a href="https://www.osintafrica.net/what-is-osint/">https://www.osintafrica.net/what-is-osint/</a></p>
<p><span style="color: #000000;">Here you have the best Threat Intelligence tools used by most of the organizations:</span></p>
<ol>
<li><span style="color: #000000;"><strong> Recorded Future</strong></span></li>
</ol>
<p><span style="color: #000000;">Uses AI and machine learning to analyze data from the open web, dark web, and technical sources.</span></p>
<ul>
<li><span style="color: #000000;"><strong>Key Features</strong>:</span>
<ul>
<li><span style="color: #000000;">Real-time threat intelligence</span></li>
<li><span style="color: #000000;">Risk scoring for IPs, domains, and vulnerabilities</span></li>
<li><span style="color: #000000;">Integrations with SIEMs and SOAR platforms</span></li>
</ul>
</li>
</ul>
<ol start="2">
<li><span style="color: #000000;"><strong> Anomaly Threat Stream</strong></span></li>
</ol>
<p><span style="color: #000000;">Aggregates threat data from multiple sources and applies AI to correlate and prioritize threats.</span></p>
<ul>
<li><span style="color: #000000;"><strong>Key Features</strong>:</span>
<ul>
<li><span style="color: #000000;">STIX/TAXII support</span></li>
<li><span style="color: #000000;">Threat sharing communities</span></li>
<li><span style="color: #000000;">Machine learning-based threat scoring</span></li>
</ul>
</li>
</ul>
<ol start="3">
<li><span style="color: #000000;"><strong> Mandiant Threat Intelligence (by Google Cloud)</strong></span></li>
</ol>
<p><span style="color: #000000;">Backed by frontline incident response data and AI-driven analytics.</span></p>
<ul>
<li><span style="color: #000000;"><strong>Key Features</strong>:</span>
<ul>
<li><span style="color: #000000;">Nation-state actor tracking</span></li>
<li><span style="color: #000000;">Threat actor profiles</span></li>
<li><span style="color: #000000;">Integration with Chronicle and Google Cloud Security</span></li>
</ul>
</li>
</ul>
<p><span style="color: #000000;">    4. <strong>IBM X-Force Exchange </strong></span></p>
<p><span style="color: #000000;">A collaborative platform for sharing threat intelligence across industries.</span></p>
<ul>
<li><span style="color: #000000;"><strong>Key Features</strong>:</span>
<ul>
<li><span style="color: #000000;">AI-enhanced threat analysis</span></li>
<li><span style="color: #000000;">Community-driven threat sharing</span></li>
<li><span style="color: #000000;">Integration with IBM QRadar</span></li>
</ul>
</li>
</ul>
<ol start="5">
<li><span style="color: #000000;"><strong> Palo Alto Networks Cortex XSOAR Threat Intel Management</strong></span></li>
</ol>
<p><span style="color: #000000;">Combines threat intelligence with automated incident response.</span></p>
<ul>
<li><span style="color: #000000;"><strong>Key Features</strong>:</span>
<ul>
<li><span style="color: #000000;">Centralized threat feed management</span></li>
<li><span style="color: #000000;">AI-based enrichment and deduplication</span></li>
<li><span style="color: #000000;">Playbook-driven response</span></li>
</ul>
</li>
</ul>
<ol start="6">
<li><span style="color: #000000;"><strong> SOCRadar</strong></span></li>
</ol>
<p><span style="color: #000000;">A cybersecurity platform specializing in Extended <strong>Threat Intelligence (XTI),</strong> designed to help organizations proactively detect, analyze, and produce a report about cyber threats. It integrates multiple security disciplines such as <strong>Threat Intelligence (TI),</strong> <strong>Digital Risk Protection (DRP),</strong> and <strong>External Attack Surface Management (EASM)</strong> into a unified AI-driven solution.</span></p>
<p>&nbsp;</p>
<ul>
<li><span style="color: #000000;"><strong>Key Features</strong>:</span></li>
</ul>
<ul>
<li><span style="color: #000000;">Modular and Flexible</span></li>
<li><span style="color: #000000;">Cyber Threat Intelligence (CTI)</span></li>
<li><span style="color: #000000;">MSSP-Ready</span></li>
<li><span style="color: #000000;">Dark Web Monitoring</span></li>
<li><span style="color: #000000;">Attack Surface Management (ASM)</span></li>
<li><span style="color: #000000;">Supply Chain Intelligence</span></li>
</ul>
<ol start="7">
<li><span style="color: #000000;"><strong>ThreatQuotient </strong></span></li>
</ol>
<p><span style="color: #000000;">a cybersecurity company that provides a <strong>threat intelligence platform</strong> designed to help organizations understand and respond to cyber threats more effectively. Its core product, <strong>ThreatQ</strong>, acts as a <strong>central repository and decision support system</strong> for threat data, making it actionable for security teams.</span></p>
<ul>
<li><span style="color: #000000;"><strong>Key Features</strong>:</span></li>
</ul>
<ul>
<li><span style="color: #000000;">Threat Intelligence Management</span></li>
<li><span style="color: #000000;">Security Operations Integration</span></li>
<li><span style="color: #000000;">Threat Library</span></li>
<li><span style="color: #000000;">ThreatQ Investigations</span></li>
<li><span style="color: #000000;">Automation and Customization</span></li>
</ul>
<p>&nbsp;</p>
<p><span style="color: #000000;">All those solutions could be a good solution to protect your organization; it depends on your need and the budget.  Having a Cyber Threat Intelligence (CTI) platform in your organization is adding another layer of defense to protect your organization. If you have not implemented yet, feel free to contact us to assist you to implement a solution based on your needs.</span></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img decoding="async" src="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=100%2C100&#038;ssl=1" srcset="https://i0.wp.com/www.osintafrica.net/wp-content/uploads/2023/05/cropped-osintafrica-1.jpg?fit=200%2C200&#038;ssl=1 2x" width="100" height="100" alt="Bangaly Koita" class="avatar avatar-100 wp-user-avatar wp-user-avatar-100 photo avatar-default" /></div><div class="saboxplugin-authorname"><a href="https://www.osintafrica.net/author/admin/" class="vcard author" rel="author"><span class="fn">Bangaly Koita</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Bangaly Koita is a SOC Analyst and  Cyber Security researcher . As a passionate in cyber security,  he spends most of the time  writing articles and making videos online to share his knowledge and experience to the vast community of IT but in general Cyber Security. Feel free to contact me in case.</p>
</div></div><div class="saboxplugin-web "><a href="https://osintafrica.net" target="_self" >osintafrica.net</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/bangaly-koita-68b8b912a/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a></div></div></div><p>The post <a href="https://www.osintafrica.net/top-ai-powered-threat-intelligence-platforms/">top AI-powered threat intelligence platforms</a> first appeared on <a href="https://www.osintafrica.net">osintafrica</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">901</post-id>	</item>
	</channel>
</rss>
