If you know where to look, information is everywhere. Company data, code snippets, email addresses and network details can all be found online without much effort. "Yet many organizations underestimate how sensitive this publicly available information can be," says Bas, Ethical Hacker at The S-Unit. In an interview, he explains why OSINT is a vital part of cyber resilience and why it matters far beyond the IT department.
“OSINT stands for Open Source Intelligence, which means collecting and analyzing information from publicly accessible sources. These can include social media profiles, websites, domain certificates or even Google Images. With OSINT, we map out what is already known about an organization and how attackers could misuse that information,” Bas explains.
He adds that OSINT is often perceived as a hacking technique.
"In reality, it has much more in common with investigative work. Because it is so accessible, OSINT has become increasingly important in cybersecurity. The more you understand what is publicly visible about you, the better you can protect yourself."
“Attackers can gather an enormous amount of information anonymously and without any interaction. With OSINT techniques, you don’t need to break into a system to identify weak spots. That makes OSINT the perfect preparation for an attack.”
“For organizations, OSINT is valuable for gaining insight and preventing risks. As a defender, OSINT makes you more aware of your digital footprint: what are we sharing online, which patterns are visible and where do potential risks arise? With those insights, you can set clear guidelines, avoid unnecessary exposure and strengthen your security. The skills used by attackers and defenders are largely the same; the difference lies in how you apply them.”
"Everyone in an organization shares sensitive information online at some point. This can happen through a newsletter that unintentionally becomes publicly accessible, internal collaborations that leak outside the company or personal profiles that reveal more than intended.Employees in technical roles often receive training on how to handle information safely, but across the organization this type of awareness is still rare."
“Recruitment processes are a well-known weak spot,” Bas says. “Attackers often try to get in through HR or through new employees. Not because those employees are careless, but because they haven’t been trained to look at information in that way.”
OSINT is never a goal in itself. Its value lies in what you do with the information you uncover.
“Collecting information is only the first step. It becomes truly valuable once you understand what it means and start acting on it,” Bas explains.
“During our OSINT training, participants learn step by step how to use open sources to find targeted information online. It is highly practical: you receive the theory, but you immediately put it into practice through realistic challenges.”
“The OSINT challenges are unique,” he emphasizes. “With our background as ethical hackers, we teach others to think the way a hacker thinks. That makes the experience realistic, educational and sometimes quite eye-opening.”
You can, and it is completely free.
During the Cloud Expo, The S-Unit offers a three-hour OSINT-workshop in which you learn:
Sign up for our workshop at the Cloud Expo and experience OSINT live.