FILTER BY:
Use Cases
  • Option1
  • Option2
  • Option3
Products
  • Option1
  • Option2
  • Option3
Industries
  • Option1
  • Option2
  • Option3
Sort by
  • Ascending
  • Descending
List-icon List-icon
blog-icon
Blog
By A8 Team September 09, 2020 16 MIN READ

Combating Malware in 2020: Process, Trends and Tools

Adversaries are continuously honing their skills, planning for their next attack. How to stay one step ahead? The right framework prepares you, the latest data empowers you, and the right tools…

blog-icon
Blog
By Abel Vandegrift September 04, 2020 8 MIN READ

NSA Warning on Location Data Exposure: Your web browser is a liability

The National Security Agency recently issued a public warning that exposed location data from mobile devices can pose a security risk for government personnel, particularly those in the national…

blog-icon
Blog
By A8 Team August 25, 2020 1 MIN READ

Social media account discovery with Genymotion

How can you identify social media accounts through the “suggested friends” function? A practical guide from Authentic8 for OSINT researchers shows the steps.  

blog-icon
Blog
By Abel Vandegrift August 20, 2020 22 MIN READ

CISA: Secure Your Web Browser, It’s Essential

The Department of Homeland Security’s latest guidance for businesses deems a secure web browser “essential” to protecting critical network assets CISA’s Cyber Essentials is a guide for business and…

blog-icon
Blog
By A8 Team August 18, 2020 1 MIN READ

How to use pastebin for cyberthreat intelligence research

A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering leaked or stolen data for sale.  

blog-icon
Blog
By A8 Team August 13, 2020 22 MIN READ

Overlooked: "The Biggest Risk of All"

How is it that global spending on cybersecurity totals more than $100 billion per year, and IT has so little to show for it? Authentic8's Matt Ashburn discussed this question on the Business Security…

blog-icon
Blog
By Amir Khashayar Mohammadi August 11, 2020 1 MIN READ

vBulletin 5: zero-day from imperfect patch

Popular forum software platform vBulletin faced a brand new remote code execution zero-day vulnerability. The culprit: an imperfect patch.  

blog-icon
Blog
By A8 Team August 07, 2020 17 MIN READ

Modern CTO Interview: Flipping Turtles

Things move fast at Authentic8, most of the time. And if they don’t? That’s when leaders shine as enablers and get things back on track. Meet Kevin Lund, Chief Technology Officer and self-proclaimed…

blog-icon
Blog
By A8 Team July 31, 2020 1 MIN READ

Handbook: Tools, Tips and Tricks for Threat Hunters

A new manual published by Authentic8 helps threat hunters fill critical gaps and hone their tradecraft.  

Close
Close