Blog
The Logically blog is the place to learn about OSINT, cyber threat intelligence, and our work fighting harmful mis- and disinformation at scale.

26 July, 22
What Is Brandjacking?
Brandjacking, otherwise known as brand impersonation, refers to when an unknown entity assumes the persona of a brand for nefarious purposes. The term, a blend of the words "brand" and "hijacking," has been in use for quite some time. However, it is only recently the term has entered common parlance, likely because — thanks to social media — this genre of brand abuse has become a greater threat for companies worldwide.
Read NowBlog

7 December, 21
What is OSINT?
Open Source Intelligence. What is it? Who uses it? And why is OSINT so important in the digital information age?
Read NowBlog

11 July, 22
Responsibility, Explainability and Ethics in AI
The AI software industry is growing rapidly, evolving at a faster rate than legislators can keep up with. Due to the power of AI and its potential to have a profound impact on people’s lives, this technology needs to be developed with care. It’s essential for companies to ensure they use AI responsibly and ethically.
Read NowBlog

18 July, 22
How AI Is Helping Combat Misinformation in India
The internet and unregulated social media platforms have heightened the threat that misinformation and disinformation pose to us individually, nationally, and globally. Mis/disinformation is a borderless problem, but it’s especially acute in India.
Read NowBlog

14 August, 22
Dealing With Disinformation: How AI Products Can Help During a War
An interview with Logically's Head of Data Science, discussing how AI products can counter disinformation in the Russia Ukraine war.
Read NowBlog

14 August, 22
Crypto Investigators Vs. OSINT Investigators
What do crypto investigators and OSINT investigators have in common?
Read NowBlog

14 August, 22
How AI Helps Us Fact-Check in a Crisis
Our data scientist explains how we built an AI pipeline to help us source fact checkable claims during crises like Russia’s invasion of Ukraine.
Read NowBlog

14 August, 22
3 Examples Of Geolocation OSINT Techniques Used To Expose Chinese Operations
The PRC poses one of the largest cybersecurity threats to the U.S. and its allies. Find out how geolocation OSINT tools are used to unveil malicious mis-, dis- and malinformation campaigns.
Read NowBlog

14 August, 22
Seeing is Deceiving: How Deepfakes Work
Find out how the relatively new phenomenon of deepfakes work.
Watch NowVideo