Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Threat intelligence

Latest blogs

Topic : Threat intelligence
  • --Any--
  • Anonymous research
  • Compliance
  • Cryptocurrency
  • Cybersecurity
  • Dark web basics
  • Dark web research
  • Digital fingerprint
  • Financial crime
  • Fraud and brand misuse
  • Law enforcement
  • OSINT news
  • OSINT research
  • Phishing/malware
  • Product info
  • Secure web access
  • SOC
  • Social media
  • Threat intelligence
  • Trust and safety
  • VPN
  • Zero-trust app access

Tools, tips and methodologies for cyberthreat intelligence gathering

Our experts offer their recommendations for tools and techniques for every stage of threat intelligence research process.

21 OSINT research tools for threat intelligence investigations

Authentic8 engineers curated a list of the 21 most widely used OSINT research tools for cybersecurity investigations into sites, their…

generia blog

Gathering cyberthreat intelligence on the dark web

Looking back at DOJ guidance on best practices for leveraging the dark web in cyberthreat intel research  

generia blog

Practice safe SECs: Cyber intelligence experts on building safe operational security and information security practices

What is operational security? Why is it important for the CISO? What’s an intelligence cycle, and how do you successfully execute its data…

generia blog

The best defense is a good OSINT

Malicious actors affiliated with China’s Ministry of State Security (MSS) are utilizing publicly available data to identify vulnerabilities…

generia blog

How to use Pastebin for cyberthreat intelligence research

A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering…

generia blog

Authentic8 Silo labeled High Performer on G2

G2 released its Summer 2020 reports, and — based on verified Authentic8 customer reviews — Silo is now considered a High Performer in the…

generia blog

Cyber threat intelligence: Lack of training, tools, oversight

Cybersecurity Insider’s 2020 Cyber Threat Intelligence Report cites a problematic lack of training, tools, and oversight that could come…

generia blog

What's next in cyber threat intelligence?

In episode 3 of our cyber threat intelligence video series, we discuss (in under 9 minutes) the future of investigation platforms, data…

Blog updates

Stay updated with the latest posts from the blog
Close
Close