<img src="https://trc.taboola.com/1321591/log/3/unip?en=page_view" width="0" height="0" style="display:none">

Blog

The Logically blog is the place to learn about OSINT, cyber threat intelligence, and our work fighting harmful mis- and disinformation at scale.

 

26 July, 22

What Is Brandjacking?

Brandjacking, otherwise known as brand impersonation, refers to when an unknown entity assumes the persona of a brand for nefarious purposes. The term, a blend of the words "brand" and "hijacking," has been in use for quite some time. However, it is only recently the term has entered common parlance, likely because — thanks to social media — this genre of brand abuse has become a greater threat for companies worldwide.

Read Now

Blog

Brand protection
brand abuse
brandjacking

7 December, 21

What is OSINT?

Open Source Intelligence. What is it? Who uses it? And why is OSINT so important in the digital information age?

Read Now

Blog

Open Source Intelligence
What is OSINT?
Misinformation

11 July, 22

Responsibility, Explainability and Ethics in AI

The AI software industry is growing rapidly, evolving at a faster rate than legislators can keep up with. Due to the power of AI and its potential to have a profound impact on people’s lives, this technology needs to be developed with care. It’s essential for companies to ensure they use AI responsibly and ethically.

Read Now

Blog

AI
NLP
ethical AI

18 July, 22

How AI Is Helping Combat Misinformation in India

The internet and unregulated social media platforms have heightened the threat that misinformation and disinformation pose to us individually, nationally, and globally. Mis/disinformation is a borderless problem, but it’s especially acute in India.

Read Now

Blog

AI
Misinformation
India

14 August, 22

Dealing With Disinformation: How AI Products Can Help During a War

An interview with Logically's Head of Data Science, discussing how AI products can counter disinformation in the Russia Ukraine war.

Read Now

Blog

AI
Data Science
Disinformation

14 August, 22

Crypto Investigators Vs. OSINT Investigators

What do crypto investigators and OSINT investigators have in common?

Read Now

Blog

Crypto Investigator
OSINT

14 August, 22

How AI Helps Us Fact-Check in a Crisis

Our data scientist explains how we built an AI pipeline to help us source fact checkable claims during crises like Russia’s invasion of Ukraine.

Read Now

Blog

Ukraine
Russia
AI

14 August, 22

3 Examples Of Geolocation OSINT Techniques Used To Expose Chinese Operations

The PRC poses one of the largest cybersecurity threats to the U.S. and its allies. Find out how geolocation OSINT tools are used to unveil malicious mis-, dis- and malinformation campaigns.

Read Now

Blog

Influence Operations
OSINT
China

14 August, 22

Seeing is Deceiving: How Deepfakes Work

Find out how the relatively new phenomenon of deepfakes work.

Watch Now

Video

Deepfakes
Seeing is Deceiving
How deepfakes work