Stealer Logs for Investigations:
A New Era in OSINT
Social Links
Constella Intelligence
Constella Intelligence
Join leading OSINT vendor, Social Links, and expert provider of stealer logs and leaked data, Constella Intelligence, on April 4, 4PM CET for the free webinar Stealer Logs for Investigations: A New Era in OSINT. Learn how stealer logs and data breaches can be used to make breakthroughs in cases where traditional methods fail.
For the first time ever, we’ll be showing how the worlds of OSINT and stealer logs can be combined in a single investigative space. We’ll be sharing a unique algorithm that uses data from both open sources and infostealers, allowing investigators to find the crucial leads they need.
What You Will Explore
AGENDA
Infostealers and Data Breaches:
Key Investigative Uses
Stealer Logs: A Deep Dive
- Extracting stealer log data: device serial numbers, browser history, emails, and passwords.
- How one infected device can affect a whole family.
- How crucial financial and crypto information ends up in stealer logs.
- Organization departments that are most critical to monitor for exposure.
Combining Stealer Logs
and Data Leaks with OSINT
Case Studies:
From Theory to Practice
Q&A SESSION
Register for free
speakers
Social Links
Constella Intelligence
Constella Intelligence