Skip to content

Stay Informed: The Latest Insights in OSINT, Threat Intelligence, and Security

At Liferaft, we dive deep into the ever-evolving world of open-source intelligence (OSINT) and security. Our blog is your gateway to insightful analysis, expert commentary, and the latest trends shaping the landscape of threat intelligence, social media monitoring, and executive protection. Whether you’re managing a GSOC, navigating the complexities of SOCMINT, or exploring the nuances of alternative social platforms, our posts offer the knowledge and tools you need to stay ahead in a rapidly changing environment. 

Silhouetted fans in a packed football stadium underscore the crowd density and security challenges of major sporting events.

Long History of Terrorist Attacks on Sporting Events Informs Lead-up to World Cup

Read More

Subscribe to get our latest posts straight to your inbox once a month.

More Posts

Using OSINT to Anticipate Social Unrest Around Major Events

Using open-source intelligence (OSINT) to anticipate social unrest and activism around major events is now a core part of digital security planning. With civil unrest activity..

Read More

Liferaft’s Top Performing Content of 2025 – A Year in Review

As 2025 comes to a close, we’re reflecting on the incredible conversations, insights, and stories that resonated with our community this year. From OSINT best practices to..

Read More

Security Experts Share Their 2026 Industry Predictions

Security teams are heading into 2026 facing a very different risk picture than they did even a year ago, and that was the focus of our recent 2026 Security Predictions Live..

Read More

How to Pick the Threat Detection Tool That is Right For You

In fast-moving risk environments, such as the one we have now, it means facing more than just cyber threats; it requires understanding, monitoring, and managing threat actors who..

Read More

The Top 5 Security Features Every Business Needs

Businesses today face growing risks from external actors, insider threats, and digital vulnerabilities. A single incident, whether physical breach, cyber intrusion, or..

Read More

The War on Counterfeit Pharmaceutical Drugs

In 2022, we took a look back at the start of the World Health Organization’s GSMS program to combat counterfeit drugs through utilizing global intelligence. At that time, the..

Read More

Identity Resolution and Linking Online Personas to Real-World Threats

Make no mistake, threats are almost always hidden behind layers of anonymity, and depending on the sophistication of the bad actor, the more complex the act of reveal becomes...

Read More