Christina Lekati
banner
christinalekati.bsky.social
Christina Lekati
@christinalekati.bsky.social
#SocialEngineering, #Psychology, #HUMINT & #OSINT intertwined for the sake of security.
Happy news!! This September at @brucon we will be taking a deep dive into #socialengineering and #OSINT through a 3-day, hands-on training class!
I SO look forward to it and to meeting the participants!! 🤩👩🏻‍💻

Full class content & details: www.brucon.org/training-det...
July 16, 2025 at 4:30 PM
Very grateful for last week spent at X33fcon in Poland!
It started with 2 days full of #socialengineering & #OSINT training where I had the privilege to teach a class that was present, curious, and ready to try things out.
Big bonus: reconnecting with friends during the conference days afterwards😊
June 17, 2025 at 9:50 AM
Surprise! Really excited to announce that the next "𝑺𝒐𝒄𝒊𝒂𝒍 𝑬𝒏𝒈𝒊𝒏𝒆𝒆𝒓𝒊𝒏𝒈 & 𝑶𝒑𝒆𝒏-𝒔𝒐𝒖𝒓𝒄𝒆 𝑰𝒏𝒕𝒆𝒍𝒍𝒊𝒈𝒆𝒏𝒄𝒆 𝒇𝒐𝒓 𝑺𝒆𝒄𝒖𝒓𝒊𝒕𝒚 𝑻𝒆𝒂𝒎𝒔" open class will be happening at x33fcon in Gdynia, Poland!!

This is an intensive, 2-day training 🧵
March 31, 2025 at 3:13 PM
Not that hotel rooms have the best locking mechanisms, but leaving a room fully accessible after exiting is a whole other level. Check your doors when you leave, people.
March 14, 2025 at 3:42 PM
How can HUMINT be leveraged in Cyber Threat Intelligence?

The Dark Overlord investigation is an interesting report showcasing how HUMINT helps better understand threat actor activities, and even infiltrate their inner circles to uncover real identities.

Some notes 🧵

nightlion.com/wp-content/u...
January 28, 2025 at 3:17 PM
The Investigating Telegram class:
Samuel will discuss the types of criminal activity that leverage Telegram, as well as important investigative tools & techniques to help you maximize your information collection from the platform while maintaining appropriate OPSEC.
January 7, 2025 at 10:32 AM
The elicitation class:
Elicitation is about making people volunteer information without asking a single question.
It is part of most social engineering attempts that involve information collection, and an integral part of HUMINT operations (including threat intelligence vHUMINT).
January 7, 2025 at 10:32 AM
Snapshots from #BlackHatEurope!
Spent the week giving our 2-day training to a largely diverse class, strolling around London, celebrating a birthday (thanks to @osintgeek.de who is the best work buddy you can have), and attending the conference!
You can say it was a real FULL week.
December 15, 2024 at 7:55 PM
Our 2-day training at #DeepSec is a wrap!
It was the first time I delivered a deep-dive focusing entirely on the #psychology interplaying in social engineering & HUMINT operations at a cybersecurity conference.

It is very energizing to have a class full of curious minds!
November 26, 2024 at 11:00 AM
Less than 2 weeks left to register for the class:

“Look What You Made Me Do”: The Psychology behind Social Engineering & Human Intelligence Operations
- taking place at DeepSec in Vienna on the 19th & 20th of November!

deepsec.net/speaker.html...
November 4, 2024 at 10:51 AM
It's a happy Saturday! Kicking off BSides Berlin with a new presentation "In Deception We Trust" - the modern social engineering exploits against centuries-old human vulnerabilities 🎭
October 26, 2024 at 8:42 AM
Beyond excited to share that one of our most fun, interactive & knowledge-dense classes returns, this time at @BlackHatEvents Europe! 🎉

The talented @OSINTgeek & I will be teaching our "Fundamentals of Cyber Investigations & Human Intelligence" class on the 9-10th of December in London!
September 30, 2024 at 1:33 PM
Highly recommended book for the ones interested in how advanced threat actors operate and in the dynamics around cyberwarefare and state-sponsored attacks. Some very good case studies are included!

Summer is here and it's my time to tackle a long reading list:)
July 4, 2024 at 5:03 PM
My presentation “Physical Security, Artificial Intelligence & Open-Source Intelligence for Nuclear Facilities” - delivered at the World Institute for Nuclear Security is now public.

❗️Disclaimer: This is an edited version:some slides/details have been omitted.

www.wins.org/wp-content/u...
February 21, 2024 at 1:06 PM
Last week I had the honor to be invited by the World Institute for Nuclear Security to present my research on how #OSINT coupled with #AI can impact the physical security of nuclear facilities.

Thank you for inviting me,I had a great time learning from others & meeting everyone!
February 14, 2024 at 9:47 AM
There has been quite some conversation around this lately. My take: Large Language Models (LLMs) like ChatGPT cannot be treated as an OSINT tool simply because...they do not get the job done. On multiple levels.
(🧵)
January 31, 2024 at 5:46 PM
In a few months @OSINTgeek and I will be returning to Singapore for another training at Black Hat Asia!

However... this time, in addition to the updates we have made, there will also be a little surprise, something we have never done before 🤭🤫
December 15, 2023 at 11:00 AM
Not too many deliveries make me jump off my chair, but this one certainly did! My new book arrived & I just can't wait to delve into its pages...

We get to the core of how social engineering works (and how to thwart this threat) by getting to the core of human psychology and behavior.
November 23, 2023 at 11:32 AM
I had heard the rumors and I am happy to report that they were true.
Last week I had the pleasure of participating at the Swiss Cyber Storm as a speaker.

It was one of THE most mentally stimulating conferences I have been to, a top shelf kind of conference for cybersecurity.
November 2, 2023 at 10:23 AM
Last Call for Registrations!
In 2 weeks we will be meeting at DeepSec in Vienna for a deep dive training on #SocialEngineering & #OSINT!

Join the 2-day training "Practical Social Engineering & Open-source Intelligence"

⬇️ Details & Registration: ow.ly/oGRH50PEZoE
October 30, 2023 at 1:22 PM
OSINT has developed to a degree that is much more complex than it used to

We need an investigative methodology that supports all the capabilities of today's world in an organized & reproducible manner; the tools,the analytical thinking, the investigative process

Accurate quote:
September 22, 2023 at 5:11 PM
Second-layer document investigation: use exfiltration tools to reveal metadata on documents of interest. Specific to PDFs; Exiftool can reveal metadata that had been scraped (2nd side)⬇️
September 22, 2023 at 3:58 PM
Through mistakes or misconfigurations, certain AWS S3 buckets or other cloud storage providers that contain sensitive documents become publicly accessible and indexed by search engines ⬇️
September 22, 2023 at 3:57 PM
Leak sites: Telegram is one rich resource for information that has been stolen or leaked. You can apply dorks within the platform:
September 22, 2023 at 3:57 PM
Programmable search engines help you narrow down your results, make them more relevant & speed up the process.
@nixintel.bsky.social wrote a blog post on how to create one:
www.osintcurio.us/2022/09/12/f...
September 22, 2023 at 3:56 PM