🇮🇱🎗🇺🇲 What an emotional and joyful day — our kidnapped brothers are finally coming home.
עלינו
IntelEye is a leading provider of intelligence collection and data fusion solutions, empowering governments and enterprises to make informed decisions and manage risks in the ever-evolving digital landscape. We offer the most comprehensive internet monitoring platform available, covering the clear, deep, and dark web, as well as restricted groups in popular instant messaging services. Our powerful AI engine and machine learning algorithms extract meaningful insights from this vast data ocean, delivering vital and actionable intelligence to our clients. Inteleye's solutions are used by organizations across various sectors, including cybersecurity, de-anonymization, market research, counterterrorism and security, fraud prevention, and law enforcement.
- אתר אינטרנט
-
https://inteleye.io
קישור חיצוני עבור INTELEYE
- תעשייה
- Technology, Information and Internet
- גודל החברה
- 11-50 עובדים
- משרדים ראשיים
- Tel Aviv
- סוג
- בבעלות פרטית
- הקמה
- 2023
- התמחויות
מיקומים
-
הראשי
Tel Aviv, IL
עובדים ב- INTELEYE
עדכונים
-
We’re now on X! 🚀 All our latest reports, research, and product updates will be shared there too. Follow us 👉 @inteleye_io https://x.com/IntelEye_io Let’s stay connected.
-
🚨 Update: Documents in Gaza confirm IntelEye's findings on the Global Sumud Flotilla Once again, our investigation is validated. Newly uncovered Hamas documents seized in Gaza show the Global Sumud Flotilla is not a grassroots relief campaign, but part of Hamas’s overseas apparatus. - Coordination is run through the Palestinian Council for the Promotion of Abroad (PCPA), Hamas’s external proxy network, already designated a terror entity by Israel. - A 2021 letter signed by Ismail Haniyeh openly ties the PCPA’s activities abroad to Hamas’s leadership. - A second file identifies flotilla figures: Zaher Birawi (UK), a veteran flotilla coordinator, and Saif Abukshek (Spain). - Abu Kashk also heads Cyber Neptune, a Hamas-controlled front company that secretly holds ownership of many flotilla ships. These documents reinforce what we reported last week: the flotilla is conceived, funded, and directed by Hamas, operating under the guise of humanitarian action.
-
-
Intelligence Exposure: The Gaza Flotilla Network and Its Ties to Hamas In recent months, at IntelEye, together with our research group, the A-TEAM, we conducted one of the most comprehensive investigations to date into the networks behind the Gaza flotilla. The investigation reveals: 1. Financial and organizational structures linking ostensibly humanitarian actors to Hamas. 2. A global network leveraging the flotilla as a political and influence operation. 3. A detailed mapping of organizations, associations, and funding routes previously undisclosed. The report, prepared by IntelEye, provides an in-depth investigation into the Global March To Gaza (GMTG) and its affiliated organizations – the Global Sumud Flotilla (GSF) and the Freedom Flotilla Coalition (FFC). The research relied on advanced intelligence capabilities and Inteleye’s proprietary research platforms, developed for governments and intelligence agencies. These platforms enable de-anonymization, profiling, and the construction of unique network linkages, uncovering a sophisticated and globally dispersed structure that operates under the guise of humanitarian aid while maintaining significant ties to designated terrorist entities. This is a first-of-its-kind intelligence exposure – extensive, evidence-based, and meticulously documented – providing critical insights into what is truly happening behind the scenes of the Gaza flotilla campaigns. Read the full report: https://lnkd.in/d_6pMsCy #IntelEye #IntelligenceExposure #Research #Intelligence #Security #CounterTerrorism #TerrorFinancing #GlobalSecurity #NetworkAnalysis #DeAnonymization #Profiling #IntelligenceCommunity #NationalSecurity #GMTG #GSF #FFC #GazaFlotilla #Flotilla #CyberSecurity #CyberNews #Infosec #OSINT #ThreatIntelligence #CNN #BBC #Reuters #AP #FoxNews #SkyNews #Bloomberg #FinancialTimes #TheEconomist #NYTimes #WSJ #WashingtonPost #AlJazeera #JerusalemPost #TimesofIsrael #i24News #Haaretz #israelhayom
-
Gonjeshke Darande: Strategic Cyber Disruption of Iran’s IRGC Infrastructure and Command From 2021 – 2025, the threat group “Predatory Sparrow” (a.k.a. Gonjeshke Darande / Indra_godof_war) executed a string of pinpoint cyber-operations that crippled Iran’s transport, energy, finance and media networks—exposing systemic flaws and humiliating the regime while sparing civilians. For a deep dive into their strategy, tradecraft and impact → [read the full article] Samuel E Shay Maman🎗️ Sonya Shapirovska
-
🚨 INTELEYE Intelligence Brief – Terror Incident Analysis On June 1st, 2025, a brutal terror attack struck the heart of Boulder, Colorado. During a peaceful “Run For Their Lives” solidarity walk advocating for the release of Israeli hostages held by Hamas, a 45-year-old man — Mohamed Sabry Soliman — launched a premeditated assault on innocent civilians. Disguised as a utility worker, Soliman used a homemade flamethrower and hurled Molotov cocktails into the crowd. Eyewitnesses reported him shouting “Free Palestine!” as the firebombs exploded, setting participants ablaze. Twelve individuals, aged between their 50s and 80s, sustained burn injuries. Eight were hospitalized with severe burns, including two who were airlifted to specialized burn units. Soliman later admitted that he intended to “kill Zionists.” INTELEYE's research team has conducted an in-depth investigation into the background, radicalization timeline, and digital footprint of the attacker — revealing long-standing extremist tendencies dating back to 2013. Stay tuned for the full intelligence report. #Terrorism #CounterTerrorism #INTELEYE #BoulderAttack #Radicalization #OSINT #IntelReport Authors: Shay Maman🎗️Samuel E
-
Nytheon AI, dubbed the "GPT of the Dark Web," is gaining attention in cybersecurity circles. This tool offers real-time support to cybercriminals, requiring no coding expertise. It’s reportedly used to generate malware, counterfeit documents, and orchestrate phishing campaigns. IntelEye's research team successfully de-anonymized the creator of NytheonAi, revealing his identity and his social presence. Samuel E Read the full investigation:
-
INTELEYE is Hiring: Senior OSINT Analyst INTELEYE is seeking a highly skilled and technically proficient Senior OSINT Analyst to join our intelligence division. This role involves conducting advanced open-source intelligence operations in support of global crime prevention and counter-terrorism efforts. Key Responsibilities: Lead in-depth OSINT investigations targeting criminal, terror-related, and malicious digital activity Collect, process, and analyze data from a wide range of open sources, including social media, forums, public databases, and the deep/dark web Utilize and develop tools, scripts, and automated workflows to optimize intelligence gathering Produce clear, actionable intelligence reports to support operational teams and decision-makers Requirements: Minimum 3 years of hands-on OSINT experience, preferably within cyber, law enforcement, or national security domains Proven expertise in digital investigations and working with intelligence-gathering tools Deep understanding of online infrastructures, anonymized identities, and illicit digital ecosystems Strong analytical capabilities, attention to detail, and a high level of professional discretion Ability to work independently in a dynamic, fast-paced environment CV - [email protected]
-
-
The Fall of BreachForums – A Major Win for Global Cybercrime Enforcement This week marks a significant milestone in the fight against cybercrime. The FBI, in close coordination with international law enforcement partners—including the UK’s NCA, the Australian Federal Police, New Zealand Police, and Swiss authorities—has seized BreachForums, one of the most notorious cybercrime marketplaces on the dark web. BreachForums was a central hub for cybercriminals trading stolen credentials, personal information, and financial data. The takedown also included its associated Telegram channel, effectively disrupting its digital footprint. According to the FBI's official notice, they are now actively reviewing backend data from the seized site. Individuals with relevant intelligence are encouraged to assist via breachforums.ic3.gov. A quick timeline of key events: Mar 2022 – Mar 2023: BreachForums v1 was operated by “Pompompurin” (Conor Brian Fitzpatrick), who was later arrested and pled guilty to hacking charges. Jun 2023 – May 2024: BreachForums v2 was run by threat group ShinyHunters. 2022: BreachForums emerged following the takedown of its predecessor, RaidForums, during Operation TOURNIQUET. While this is a major operational success, the cybercrime ecosystem continues to evolve. At IntelEye, we’re actively monitoring dark web shifts, newly emerging platforms, and changes in threat actor activity patterns in the aftermath of this takedown. Threat intelligence is only as strong as the eyes watching. We’re watching. #IntelEye #CyberThreatIntelligence #BreachForums #RaidForums #DarkWebMonitoring #FBI #CyberCrime #ThreatIntel #ShinyHunters #Pompompurin #InfoSec #Inteleye
-