Mario Santella https://www.mariosantella.com/ Security- OSINT - IT Thu, 13 Nov 2025 18:06:50 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 How to Background Check an Italian Company in 10 Minutes https://www.mariosantella.com/how-to-background-check-an-italian-company-in-10-minutes/ Thu, 13 Nov 2025 11:09:18 +0000 https://www.mariosantella.com/?p=1927 You need to assess an Italian company — fast. Here’s the workflow: start with Tesari AI (paid), then layer free, public checks. Total time: ~10 minutes. All open source. Step 0: Tesari AI — your starting point Enter the company info like this: Tesari will return a very long report: Legal structure (Registro Imprese) PEC,...

L'articolo How to Background Check an Italian Company in 10 Minutes proviene da Mario Santella.

]]>
You need to assess an Italian company — fast.

Here’s the workflow: start with Tesari AI (paid), then layer free, public checks. Total time: ~10 minutes. All open source.


Step 0: Tesari AI — your starting point

Enter the company info like this:

Tesari will return a very long report:

  • Legal structure (Registro Imprese)
  • PEC, headquarters, administrators
  • Offshore links, past mergers/acquisitions
  • Sanctions or legal proceedings (if publicly reported)
  • National media coverage (e.g., La Repubblica, Il Sole 24 Ore)
  • Known domains and corporate network

This isn’t the full picture — but it’s the map. While your job is running on Tesari, you can proceed with the following steps…


1. WHOIS + reverse WHOIS

In Italy and for .it domains the way to go is: whois.nic.it (registrant info is public by law).

Got a name/surname? Run a reverse lookup:

  • ViewDNS.info
  • Or: “Name Surname” site:whois.domaintools.com

If the same person registered blockchain-italia-example.io, ai-consulting-2024-example.com, and your target — that’s a pattern, not a coincidence. It’s up to you.


2. Legal address → Google Maps + Street View

Is it a business center, a coworking space, or a residential flat?

Also: check Google Maps reviews.

Even B2B companies get reviews:

  • “Contracted them for service X — never delivered.”
  • “Great support during implementation.”

Look for verified reviews, recurring themes, and whether they respond professionally. You can find many signals in Google reviews.

For this purpose, also check:

  • Trustpilot
  • ScamAdviser (for domain + review cross-check)
  • Industry-specific forums (e.g., Server Fault for tech vendors) – only if you have extra time.

3. Financials — no “visura” needed

ufficiocamerale.it shows, for free:

  • Revenue
  • Net profit
  • Employee count
  • ATECO code

If they claim “enterprise scale” but report €80k revenue and 3 employees, that’s useful context.


4. Find PDFs everywhere (not just their site)

Use these dorks:

"Company Name" filetype:pdf
"CEO Name" filetype:pdf
"Founder Surname" filetype:pdf
site:slideshare.net "Company Name"
site:company.it filetype:pdf

People present at external events, conferences, university talks. Those decks often leak:

  • Real tech stack
  • Actual clients
  • Internal org structure

And they’re public.


5. LinkedIn: Company Page → People tab

Don’t just scroll posts. Go to Company Page → People.

Filter by “Current employees.”

Compare:

  • How many actually list the company?
  • Are key roles (CTO, CISO, Head of Ops) filled?
  • Do profiles match the narrative (e.g., “ex-Microsoft AI team” → check timeline)?

In small firms, this tab is more honest than the “About” section.

Also: scroll recent posts. The same 3–4 names liking everything? Those are your real stakeholders.
I know a lot of other tool to investigate companies (check out The OSINT Rack for more) but we’re handling with a 10 minute task, so we will skip that part and keep moving on with the next step.


That’s it.

Today AI tools like Tesari AI can boost this activity, and give the starting point, a decent good one; the other steps enrich the report and are easily approachable also for non-OSINT people.

The rest is on you.

L'articolo How to Background Check an Italian Company in 10 Minutes proviene da Mario Santella.

]]>
How We Found Potential AI Leaks in 15 Minutes https://www.mariosantella.com/how-we-found-potential-ai-leaks-in-15-minutes/ Wed, 12 Nov 2025 17:01:16 +0000 https://www.mariosantella.com/?p=1918 Your company has an AI usage policy. Great. But a policy on paper doesn’t stop attackers, it only passes audits. Because the real risk isn’t that someone uses DeepSeek or other low-friction AI tools. The real risk is that they use it with a company email, a personal Gmail, or even a “work alias” like...

L'articolo How We Found Potential AI Leaks in 15 Minutes proviene da Mario Santella.

]]>
Your company has an AI usage policy.

Great.

But a policy on paper doesn’t stop attackers, it only passes audits.

Because the real risk isn’t that someone uses DeepSeek or other low-friction AI tools.
The real risk is that they use it with a company email, a personal Gmail, or even a “work alias” like mario.dev.work@gmail.com – paired with a password they haven’t changed since 2021 and no 2FA.

And you won’t know there’s even a potential exposure until it’s too late.

Instead of waiting for evidence of abuse, we did what an attacker would do:
we went looking for our own potential data leaks.
Not by spying on employees.
But by testing our external attack surface with the same data an adversary would use.

Here’s what we found in 15 minutes of focused reconnaissance.


Phase 1: Attackers hunt fresh exposure—not history

An attacker won’t start with 2019 breaches. They want recent infostealer logs, because those credentials are most likely still valid, and tied to active sessions.

We filtered recent breach data (November, 2025 onward) for any record tied to our organization’s naming patterns, whether corporate (`*@company.com`) or personal (`first.last@gmail.com`, `dev.alias@proton.me`, etc.).
No archives. No noise. Just currently exposed credentials. So we used a perfect platoform for that job: DarknetSearch by Kaduu with the leak center tool.

Phase 2: “We rotated that password years ago—what’s the issue?”

Among dozens of recent exposures, most had already been flagged by IAM.
But one stood out: a weak, personal-pattern password.

MRossi1980!

Not random. Not temporary. A classic mnemonic root-name plus birth year.
This isn’t an anomaly. It’s a systemic behavior.

And here’s the catch: this password wasn’t just on a personal account.
It was also found—unchanged—on a company email used to register for third-party services, including AI tools.
Why? Because no one forced a password reset on those external platforms. Your corporate rotation policy doesn’t reach DeepSeek, GitHub, or that SaaS tool signed up for in 2021.

Even worse: we found the same root tied to a “dummy” work account—`m.rossi.dev@gmail.com`—created to bypass corporate SSO and access “quick” dev tools.
These shadow identities are rarely monitored, never rotated, and often packed with sensitive context.

The Lifecycle of a Potential Leak

2021: First appearance

In a historical breach: `m.rossi@company.com : MRossi1980`.
Weak, but contained within a now-retired system.

2022–2024: Surface-level compliance

Corporate accounts got stronger passwords.
But the same user kept using `MRossi1980` everywhere else—on forums, AI tools, cloud IDEs—because those services never asked them to change it.

2025: Risk lives in the shadows

Today, a fresh infostealer log (November 2025) shows:

No 2FA. No corporate visibility. No compromise—yet.

Using public OSINT (professional profiles, code commits, domain history), we confirmed this alias belongs to an active employee—without accessing private data.

I can suggest a lot of tools to do that in this dedicated section of my website: The OSINT Rack

DeepSeek allows email/password login (not just OAuth), and syncs chat history by default.
If the user ever pasted internal code, API keys, or system logic into that chat… it’s now sitting in an exposed account.
We don’t know if they did.
But an attacker wouldn’t wait to find out.

Phase 3: We stopped there – and that’s the point

We never attempted to access the account.
We never will. It’s unnecessary, unethical, and illegal.

Because this isn’t about proving actual data loss.
It’s about identifying potential exposure before it becomes a breach.

The chain is real:

  1. A mnemonic root persists for years.
  2. Corporate policy only enforces change inside the perimeter.
  3. Outside it, that root secures personal emails, dummy aliases, and unsanctioned AI tools.
  4. Those services become silent vaults of risk—until an infostealer opens them.

From Simulation to Mitigation

This isn’t an HR issue.
It’s a security design flaw.

The response should be strategic:

  • Mandate password managers for all accounts—not just corporate ones.
  • Inventory shadow identities: `*@gmail.com`, `*@proton.me`, etc., used for work.
  • Provide approved, sandboxed AI tools—so employees don’t create risky aliases to get work done.
  • Treat external email exposure as identity risk: monitor fresh infostealer data for any address tied to your org’s naming patterns.

So, for the future…

The most dangerous password isn’t the one you use today.
It’s the one you think is dead—but lives on in a Gmail alias, a forgotten SaaS account, or an AI chat history.

Real defense isn’t about hoping your policy works.
It’s about verifying—every day—that it holds up in the real world, where attackers start with a 15-minute search…
and end with your data.

L'articolo How We Found Potential AI Leaks in 15 Minutes proviene da Mario Santella.

]]>
Email Extractor https://www.mariosantella.com/email-extractor/ Sun, 09 Nov 2025 11:14:21 +0000 https://www.mariosantella.com/?p=1916 Open-source tool for concurrent crawling of websites and their internal links to collect email addresses. https://github.com/rix4uni/emailextractor

L'articolo Email Extractor proviene da Mario Santella.

]]>
Open-source tool for concurrent crawling of websites and their internal links to collect email addresses.

https://github.com/rix4uni/emailextractor

L'articolo Email Extractor proviene da Mario Santella.

]]>
Spottr https://www.mariosantella.com/spottr/ Sun, 09 Nov 2025 11:12:55 +0000 https://www.mariosantella.com/?p=1914 CTRL+F for Videos with AI. Searching for anything inside video content, treating footage like text. It can identify objects https://usespottr.com

L'articolo Spottr proviene da Mario Santella.

]]>
CTRL+F for Videos with AI. Searching for anything inside video content, treating footage like text. It can identify objects

https://usespottr.com

L'articolo Spottr proviene da Mario Santella.

]]>
onion-lookup https://www.mariosantella.com/onion-lookup/ Sun, 09 Nov 2025 11:10:43 +0000 https://www.mariosantella.com/?p=1912 Check the existence and retrieve metadata of Tor hidden services. A critical resource for dark web reconnaissance and monitoring. https://onion.ail-project.org

L'articolo onion-lookup proviene da Mario Santella.

]]>
Check the existence and retrieve metadata of Tor hidden services. A critical resource for dark web reconnaissance and monitoring.

https://onion.ail-project.org

L'articolo onion-lookup proviene da Mario Santella.

]]>
Tosint https://www.mariosantella.com/tosint/ Sun, 09 Nov 2025 11:09:17 +0000 https://www.mariosantella.com/?p=1910 Python tool designed for Telegram OSINT. It extracts valuable, detailed metadata from Telegram bots and channels, including user counts, admin roles, invite links, and user IDs. https://github.com/drego85/tosint

L'articolo Tosint proviene da Mario Santella.

]]>
Python tool designed for Telegram OSINT. It extracts valuable, detailed metadata from Telegram bots and channels, including user counts, admin roles, invite links, and user IDs.

https://github.com/drego85/tosint

L'articolo Tosint proviene da Mario Santella.

]]>
Cold Relation https://www.mariosantella.com/cold-relation/ Sun, 09 Nov 2025 11:07:42 +0000 https://www.mariosantella.com/?p=1908 A free to use (currently in Alpha) platform with dedicated tools for in-depth analysis of channels and posts across Telegram, VK, TikTok, and X (Twitter), alongside a dedicated China Suite (Weibo, QQ, Tieba). https://coldrelation.com/

L'articolo Cold Relation proviene da Mario Santella.

]]>
A free to use (currently in Alpha) platform with dedicated tools for in-depth analysis of channels and posts across Telegram, VK, TikTok, and X (Twitter), alongside a dedicated China Suite (Weibo, QQ, Tieba).

https://coldrelation.com/

L'articolo Cold Relation proviene da Mario Santella.

]]>
Flowsint https://www.mariosantella.com/flowsint/ Sun, 09 Nov 2025 11:06:12 +0000 https://www.mariosantella.com/?p=1906 A modern platform for visual, flexible, and extensible graph-based investigations. Flowsint connects, enriches, and visualizes complex data relationships, utilizing a Neo4j backend and native integration with n8n for building sophisticated OSINT automation workflows. https://www.flowsint.io

L'articolo Flowsint proviene da Mario Santella.

]]>
A modern platform for visual, flexible, and extensible graph-based investigations. Flowsint connects, enriches, and visualizes complex data relationships, utilizing a Neo4j backend and native integration with n8n for building sophisticated OSINT automation workflows.

https://www.flowsint.io

L'articolo Flowsint proviene da Mario Santella.

]]>
Malfors https://www.mariosantella.com/malfors/ Sun, 09 Nov 2025 11:04:58 +0000 https://www.mariosantella.com/?p=1904 Investigation platform built for analysts, featuring intuitive graph mapping, real-time team collaboration, and integrated entity enrichment from various data sources. https://malfors.com/

L'articolo Malfors proviene da Mario Santella.

]]>
Investigation platform built for analysts, featuring intuitive graph mapping, real-time team collaboration, and integrated entity enrichment from various data sources.

https://malfors.com/

L'articolo Malfors proviene da Mario Santella.

]]>
DarknetSearch https://www.mariosantella.com/darknetsearch/ Sun, 09 Nov 2025 11:04:08 +0000 https://www.mariosantella.com/?p=1902 Dark Web Monitoring and Cyber Threat Intelligence solution. It continuously tracks exposed assets, compromised credentials (PII, credit cards), and sensitive data across dark web forums, Telegram, Discord, and I2P networks for proactive threat detection. https://darknetsearch.com

L'articolo DarknetSearch proviene da Mario Santella.

]]>
Dark Web Monitoring and Cyber Threat Intelligence solution. It continuously tracks exposed assets, compromised credentials (PII, credit cards), and sensitive data across dark web forums, Telegram, Discord, and I2P networks for proactive threat detection.

https://darknetsearch.com

L'articolo DarknetSearch proviene da Mario Santella.

]]>