FILTER BY:
Use Cases
  • Option1
  • Option2
  • Option3
Products
  • Option1
  • Option2
  • Option3
Industries
  • Option1
  • Option2
  • Option3
Sort by
  • Ascending
  • Descending
List-icon List-icon
blog-icon
Blog
By A8 Team October 15, 2021 1 MIN READ

6 strategies for law enforcement agents who investigate online

The right strategies and resources for conducting OSINT on the surface, deep and dark web can make online investigations more efficient, secure and compliant.

blog-icon
Blog
By A8 Team September 30, 2021 6 MIN READ

Social media’s value and danger to law enforcement investigations

Social media is increasingly useful to law enforcement investigations. But it, along with other OSINT sources, comes with inherent risks to access.

blog-icon
Blog
By A8 Team September 29, 2021 7 MIN READ

21 OSINT research tools for threat intelligence investigations

Authentic8 engineers curated a list of the 21 most widely used OSINT research tools for cybersecurity investigations into sites, their users and owners.

blog-icon
Blog
By A8 Team September 22, 2021 3 MIN READ

COMB makes billions of leaked credentials easily discoverable

The Compilation of Many Breaches (COMB) has been published on a surface web hacking forum, making 3.2 billion pairs of passwords and emails easily searchable.

blog-icon
Blog
By Thom Kaye September 21, 2021 4 MIN READ

Use OSINT to Contextualize GEOINT

The ZAPAD-21 military exercise is a prime example of an event where GEOINT can benefit from the added context of OSINT.

blog-icon
Blog
By A8 Team September 17, 2021 4 MIN READ

What’s in your digital fingerprint and how to control it

Your digital fingerprint — or browser fingerprint — may seem like innocuous details. But for online investigators, especially in law enforcement, they could make or break your case.

blog-icon
Blog
By Abel Vandegrift September 15, 2021 3 MIN READ

4 things you shouldn’t do on the dark web

Avoid a world of trouble by following these four simple recommendations of what not to do on the dark web during online investigations.

blog-icon
Blog
By Abel Vandegrift September 07, 2021 3 MIN READ

Best practices for creating a dark web access policy

Protect your company and employees by creating a dark web access policy to set protocol for investigations to mitigate security and legal challenges.

blog-icon
Blog
By Adam Huenke September 02, 2021 3 MIN READ

Mitigating risk in SOC investigations with managed attribution

Cloud-based web isolation to neutralize cyberthreats in employees’ everyday web activity — but how do SOCs secure their own online investigations that require them to interact with malicious content…

Close
Close