RSA 2026Come see what your attackers already know→
GhostEye
PLATFORMCOMPANYRESOURCES
SCHEDULE DEMO

Find out who in your company is exposed.

PLATFORM

Overview

RESOURCES

BlogResearchEventsNewsProductGlossary

COMPANY

About
GhostEye
22 Vanderbilt Suite 7C
New York, NY 10017
founders@ghosteye.ai
Trust CenterHelp CenterSchedule DemoTerms of UsePrivacy Policy

© 2026 GhostEye, Inc. All rights reserved.

  1. ← Glossary
  2. /
  3. OSINT (Open Source Intelligence)

OSINT (Open Source Intelligence)

PLATFORM CONCEPTS
·2 min read·Updated Mar 2026

Open source intelligence (OSINT) is the practice of collecting and analyzing publicly available information from open sources - social media, websites, public records, news, code repositories, breach databases, and more - to produce actionable intelligence. In cybersecurity, OSINT is used both by attackers (to research targets) and by defenders (to assess exposure)..

What is OSINT?

Open source intelligence (OSINT) is the practice of collecting and analyzing publicly available information from open sources - social media, websites, public records, news, code repositories, breach databases, and more - to produce actionable intelligence. In cybersecurity, OSINT is used both by attackers (to research targets) and by defenders (to assess exposure).

How OSINT Works in Social Engineering

Attackers use OSINT to build detailed profiles of their targets before launching social engineering attacks. LinkedIn reveals roles, reporting structures, and tech stacks. GitHub shows what employees work on and when. Strava and social media reveal personal routines. Breach databases provide exposed credentials. Job postings disclose infrastructure details. All of this is free, legal, and accessible to anyone. A skilled attacker can build a complete attack profile on an employee in under 30 minutes.

Why OSINT Matters for Organizations

If an attacker can find it, it's a vulnerability. Most organizations have no visibility into what's publicly available about their employees. OSINT-based employee exposure monitoring fills this gap - proactively identifying the data attackers would use and reducing exposure before it's exploited.

On this pageWhat is OSINT?How OSINT Works in Social EngineeringWhy OSINT Matters for OrganizationsFAQ

Frequently Asked Questions

How much can attackers learn about employees from OSINT?

Significant amounts. LinkedIn reveals job titles, project details, and reporting structures. GitHub shows what employees work on. Job postings disclose infrastructure details. Breach databases provide exposed credentials. A skilled attacker can build a detailed profile on an employee in under 30 minutes, all without illegal activity.

Is OSINT gathering illegal?

No. OSINT only involves publicly available information that anyone can access. It's legal and ethical for defenders to use. However, it's commonly used by attackers too. The key defense is reducing what's publicly available about your employees and organization.

What should organizations do about OSINT risks?

Implement employee exposure monitoring to identify what's publicly discoverable. Reduce org chart visibility on external sites. Audit employee social media profiles. Control what information appears in job postings. Test whether employees can be found and profiled, then use that data to prioritize security training.

Can OSINT data be used to improve security without being invasive?

Yes. Organizations can gather OSINT on their own employees (with consent) to identify what attackers can discover. This data then informs targeted security training and exposure reduction efforts. The goal is to fix vulnerabilities before attackers find them.

Related Terms
Human Attack SurfaceEmployee Exposure MonitoringSocial EngineeringPretextingSpear Phishing