(24/04/23) Blog 114 – OSINT pt3
In my last post in this min-series on OSINT, I covered some of the techniques used in the sub-category of SOCMINT and how posting data across social media could allow a threat actor to uncover sensitive data. In this post, I will take a look at metadata. What is metadata? […]
Continue Reading