OsintVarta and Lex Talionis have developed a map

6,000 defense-industrial complex enterprises of the russian federation are now available on an interactive map. Lex Talionis and OsintVarta have developed a map of enterprises operating within the aggressor state. The platform includes descriptions of their activities and specific developments, information on vetted employees with enriched data, as well as structured categorization for easier navigation and analysis.
[Read more]

SHUM CAMP is expanding its volunteer team

We are currently looking for: OSINT / GEOINT / Technical Intelligence Analyst Volunteer Editor Community Manager AI / Automation / Full-Stack Engineer Our work focuses on open-source investigations, analytical reporting, community coordination, and building technical tools that support evidence-based research. All roles are remote with flexible engagement. If you are interested in applying your analytical, editorial, community, or technical skills to meaningful investigative work, we invite you to join our team.
[Read more]

New publication. APT28 Fancy Bear.

A closer look at the hacker group APT28, also known as Fancy Bear. APT28 does not operate randomly. Its target selection is systematic and politically driven, aligning with russia’s active geopolitical interests. During the 2016 U.S. presidential election, the breach of email accounts and servers belonging to U.S. political organizations became more than a hacking incident — it became an instrument of geopolitical influence.
[Read more]

New publication. APT 44 Sandworm.

In 2017, the NotPetya cyberattack caused more than $10 billion in global economic damage, disrupting ports, manufacturing operations, and logistics networks worldwide. According to official statements from the U.S. and U.K. governments, the attack was attributed to units of russia’s military intelligence agency (GRU) — specifically the group known as Sandworm (also referred to as APT44).
[Read more]

OSINT Copilot platform now available for SHUM partners and personnel

OSINT Copilot is an intelligence automated solution to quickly collect and organize open-source information in one place. Instantly structured data instead of spending time manually assembling information. The Service utilizes AI and LLMs to generate reports, summaries, and risk assessments. OSINT Copilot can help you: • Collect information from multiple open sources
[Read more]

Good news for Matrix users

Good news for Matrix users: we’ve launched an open news channel! We’ll be sharing updates, analytical notes, and announcements — directly on Matrix. Join here
[Read more]

Aggregator Update: One Source Added

The Aggregator tool has been updated with one new data source: LeakCheck. LeakCheck is a breach-search service that helps identify exposed credentials and related leak artifacts by searching across large leak datasets (e.g., email/username and other supported query types), with options for API-based integration, monitoring, and bulk checks.
[Read more]

Donation page update

We’ve refreshed our Donation Hub to make supporting SHUM OSINT simpler and faster. The page is now a single place where you can choose the method that fits you best and complete a donation in a couple of clicks. What’s new: Monobank jar / card payment — quick top-ups with an option to pay by card.
[Read more]

Presentation of the book about Olenivka

Next Wednesday, September 17, at 7:00 PM, MIPL, along with partners from Memorial and The Ukrainian Media, will present a book about the explosion in the Olenivka colony. The event will take place at the Sense bookstore on Khreshchatyk. We invite you to join us; all the details can be found on the event page.
[Read more]

Join the AI + OSINT Research Community on Discord

We are building a collaborative space for researchers, investigators, and practitioners who explore the intersection of artificial intelligence and open-source intelligence (OSINT). Inside the community, you’ll find: Discussions on AI-driven OSINT workflows Knowledge sharing and practical case studies Networking with like-minded professionals Opportunities to co-create research and tools The invite link is active for 7 days only.
[Read more]

Приватний розділ

Для доступу до приватного розділу введіть пароль:

Materials

Page 1 of 1
Page 1 of 1