Blog A peek behind the curtain: How are sock puppet accounts used in OSINT? June 11, 2024 How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks About The Author See author's posts Popular Stories Right nowExposing the Rogue Cyberheaven Compromised Chrome VPN Extensions Ecosystem – An AnalysisThe OWASP Top 10 for LLMs 2025: How GenAI Risks Are EvolvingWhere Is Anton Nikolaevich Korotchenko (Антон Николаевич Коротченко) Also Known as Koobface Botnet Master KrotReal? – Part Five Post Views: 23 Continue Reading Previous: The 7 deadly cloud security sins – and how SMBs can do things betterNext: WeLiveSecurity wins Best Cybersecurity Vendor Blog award! Leave a Reply Cancel replyYou must be logged in to post a comment. Related Stories AI and Security – A New Puzzle to Figure Out Blog AI and Security – A New Puzzle to Figure Out February 13, 2025 Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software Blog Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software February 13, 2025 Fast Deployments, Secure Code: Watch this Learn to Sync Dev and Sec Teams Blog Fast Deployments, Secure Code: Watch this Learn to Sync Dev and Sec Teams February 13, 2025