CTI & OSINT

In-depth analyses, case studies, and strategic articles on cyber threat intelligence and open source exploitation

You’ll find here a curated selection of analyses, case studies, and strategic articles I’ve written on cyber threat intelligence and the use of open source information.

🔍 Objective: Provide CERT teams, CTI analysts, CISOs, and cybersecurity professionals with a solid, technical, and actionable knowledge base to anticipate, detect, understand, and counter sophisticated threats.

🧠 Topics covered:

  • Threat modeling methodologies
  • Detection and creation of indicators of compromise (IOCs)
  • Adversary analysis and reverse CTI techniques
  • Exploiting intelligence from open source data (OSINT)
  • Case studies on APTs, ransomware, cyber espionage
  • Risk visualization and defense strategies

📚 Available articles:

2025