Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations.
Understanding the dark web and how it can aid your investigation
3 things to consider before you start your dark web investigation
Essential tools for improving surface and dark web research
Best practices for creating a dark web access policy
twitter
Authentic8
@Authentic8
As we continue our series exploring #OSINT resources to improve #CTI investigations, let's dive into the databases and professionals curating the info you need. @sans_isc @zackwhittaker @BleepinComputer @GossiTheDog @cglyer…
Authentic8
@Authentic8
Great issue from @jakecreps. Most important info is at the end: "Remember #OSINT != tools. Tools help you plan and collect data but the end result of that tool is not OSINT." https://t.co/RqZyjYPLXU
Authentic8
@Authentic8
As organizations adopt a zero-trust security model, the need for granular context around user access becomes crucial. That's where web isolation comes into play, offering a simpler and more secure path for #IT to grant precise…
Authentic8
@Authentic8
What we're reading today:
"The IT Army of Ukraine, a pro-Kyiv hacker collective, targets web cameras stationed in the country to prevent Russian forces from seeing its troop movements before the long-awaited…