{"id":2403,"date":"2022-06-14T06:26:28","date_gmt":"2022-06-14T06:26:28","guid":{"rendered":"\/cybersecurity-blog\/?p=2403"},"modified":"2024-07-24T07:45:59","modified_gmt":"2024-07-24T07:45:59","slug":"osintomatico-conference","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/","title":{"rendered":"ANY.RUN Supports the Osintoma\u0301tico Conference"},"content":{"rendered":"\n<p>On the weekend of May 20 and 21st, Madrid was a meeting point for specialists in OSINT and Social Engineering. <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=madrid_conference\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN (opens in a new tab)\">ANY.RUN<\/a> was excited to participate and support such an event.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the Osintom\u00e1tico Conference? \t\t\t\t\t<\/h3>\n\n\n\n<p>Global challenges are increasing. The spheres between the physical and the digital have long been borderless. And in a changing environment, companies increasingly demand analysts and experts in various types of intelligence to be able to better decide on their future.<\/p>\n\n\n\n<p>Faced with the increased demand for specialists in OSINT (Open Source INTelligence), <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/osintomatico.com\/\" target=\"_blank\">the Osintom\u00e1tico Conference<\/a> was born.&nbsp;It held its first edition in Madrid to &#8220;train and raise awareness among students, professionals, companies, and the general public about open source intelligence techniques and social engineering.&#8221;<\/p>\n\n\n\n<p>It is not the first congress specializing in OSINT celebrated in Spain. Still, it was the first to be held in Madrid, and it did so with a very extensive panel of experts and international references in this discipline that is attracting more and more attention when it comes to imagining a more digital but also safer world.<\/p>\n\n\n\n<p>The OSINT as a set of tools and techniques, can be used by cybercriminals \u2014or common criminals\u2014 to gather information about their victims. But it is also used by those who do good, those who belong to the law enforcement, those who investigate facts privately, or simply those who want to contribute their grain of sand to good causes such as participating in <a href=\"https:\/\/osintomatico.com\/seccion-ctf\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">a live TraceLabs CTF<\/a> (Capture the Flag).<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">ANY.RUN supports the Osintom\u00e1tico Conference\t\t<\/h3>\n\n\n\n<p>It was the first experience for ANY.RUN sandbox to support a conference. And then, we have become a sponsor of the CTF competition. We provided 3 premium subscriptions \u2013 <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-hunter-plan\/\" target=\"_blank\">Hunter<\/a>, a plan that gives winners of the first places expanded access to high-quality malware analysis.  <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"es\" dir=\"ltr\">? <a href=\"https:\/\/twitter.com\/anyrun_app?ref_src=twsrc%5Etfw\">@anyrun_app<\/a>  &#8211; Sandbox para an\u00e1lisis de Malware  ?<br><br>? Un cl\u00e1sico entre much\u00edsimos analistas de todos los pa\u00edses. <br><br>?? Un orgullo tenerles como patrocinadores. <br><br>? Aprovecha el \u00faltimo d\u00eda para pillar tu entrada:  ?<a href=\"https:\/\/t.co\/XH9Cz8TQKT\">https:\/\/t.co\/XH9Cz8TQKT<\/a> <a href=\"https:\/\/t.co\/4ue0JbKhuL\">pic.twitter.com\/4ue0JbKhuL<\/a><\/p>&mdash; OSINTom\u00e1tico (@OSINTomatic) <a href=\"https:\/\/twitter.com\/OSINTomatic\/status\/1527180468734550016?ref_src=twsrc%5Etfw\">May 19, 2022<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>ANY.RUN, along with NordVPN, Hunch.ly, and other companies, provided the organization with one more Hunter license. It was raffled among the concurrent audience, which left more than one happy since they are very useful tools for an OSINT investigation.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-style-large is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>\u201cFrom the organization, we want to thank ANY.RUN for their support in this first edition of the Osintom\u00e1tico Conference, hoping to continue with this union in all the editions that will take place from now on&#8230; and in the words of its Co-Founder J\u00e9zer Ferreira: \u201cIt has just to begin&#8230;&#8221;<\/strong><br><\/p>\n<cite>Roberto Gonzalez, Co-Founder of the Osintom\u00e1tico Conference&nbsp;<\/cite><\/blockquote>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=madrid_conference\">ANY.RUN<\/a> is glad that the Osintom\u00e1tico Conference was a fantastic start. For us, it\u2019s essential to contribute to the industry, and we just couldn\u2019t miss a chance. Besides that, connecting with information security leaders is always amazing, enhancing the networking experience and sharing practices to improve cybersecurity. <br><\/p>\n\n\n\n<p>We are excited to support the community&#8217;s development and participate in other future conferences!&nbsp;<br><\/p>\n\n\n\n<p>Contact Galina Zueva, our PR manager for collaboration offers: g.zueva@any.run<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the weekend of May 20 and 21st, Madrid was a meeting point for specialists in OSINT and Social Engineering. ANY.RUN was excited to participate and support such an event.&nbsp; What is the Osintom\u00e1tico Conference? Global challenges are increasing. The spheres between the physical and the digital have long been borderless. And in a changing [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3714,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[69,10],"class_list":["post-2403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-conference","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN Supports the Osintoma\u0301tico Conference - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"ANY.RUN was glad to support the Osintom\u00e1tico Conference in Madrid. And we are ready to take part in and sponsor future events.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN Supports the Osintoma\u0301tico Conference\",\"datePublished\":\"2022-06-14T06:26:28+00:00\",\"dateModified\":\"2024-07-24T07:45:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/\"},\"wordCount\":499,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"conference\",\"cybersecurity\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/\",\"name\":\"ANY.RUN Supports the Osintoma\u0301tico Conference - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-06-14T06:26:28+00:00\",\"dateModified\":\"2024-07-24T07:45:59+00:00\",\"description\":\"ANY.RUN was glad to support the Osintom\u00e1tico Conference in Madrid. And we are ready to take part in and sponsor future events.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN Supports the Osintoma\u0301tico Conference\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN Supports the Osintoma\u0301tico Conference - ANY.RUN&#039;s Cybersecurity Blog","description":"ANY.RUN was glad to support the Osintom\u00e1tico Conference in Madrid. And we are ready to take part in and sponsor future events.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN Supports the Osintoma\u0301tico Conference","datePublished":"2022-06-14T06:26:28+00:00","dateModified":"2024-07-24T07:45:59+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/"},"wordCount":499,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["conference","cybersecurity"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/","url":"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/","name":"ANY.RUN Supports the Osintoma\u0301tico Conference - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-06-14T06:26:28+00:00","dateModified":"2024-07-24T07:45:59+00:00","description":"ANY.RUN was glad to support the Osintom\u00e1tico Conference in Madrid. And we are ready to take part in and sponsor future events.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/osintomatico-conference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN Supports the Osintoma\u0301tico Conference"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2403"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=2403"}],"version-history":[{"count":2,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2403\/revisions"}],"predecessor-version":[{"id":8305,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2403\/revisions\/8305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3714"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=2403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=2403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=2403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}