Welcome to the Authentic8 blog

Wednesday, August 17
Person working on multiple monitors and laptops

Non-negotiable security needs SOCs to combat rise in phishing

Person using smartphone
Beyond Twitter: 6 social media sites you should be using for OSINT research
surface vs dark
Surface web vs. dark web: not as black and white as it may seem
Web isolation is an enabler, not just a controller
Web isolation is an enabler, not just a controller
How law enforcement can use OSINT
3 roadblocks for using OSINT in law enforcement

Latest blogs

ZAPAD 2021 precursor to Russian invasion of Ukraine

Russia/Ukraine conflict: ZAPAD 2021’s insight into military operations

Russia’s joint military exercise ZAPAD in September 2021 seems a precursor to its invasion of Ukraine. We look at how the event prepared…

Twitter mobile phone application

OSINT news roundup: Twitter sleuths, transparency and the cost of cybercrime

Stay up to date with the latest OSINT news from around the world

phishing site

Safely investigate phishing sites without getting hooked

Phishing sites commonly contain malicious content that can put SOCs and their organizations at risk as they conduct investigations. But…

Identifying disinformation

OSINT news roundup: dark web dissidents, disinfo and DIY analysts

Stay up-to-date with the latest OSINT news from around the world

banner

OSINT news roundup: Putin’s intentions, info disclosure and intelligence auxiliaries

Stay up to date with the latest OSINT news from around the world

Russia's invasion

OSINT news roundup: Russia’s invasion, disinformation and TikTok

Stay up-to-date with the latest OSINT news from around the world

Cryptocurrency

The fallacy of anonymity in cryptocurrency

Cryptocurrency addresses can feel like an investigative dead end due to the belief of anonymity. As with most things in research and…

The metaverse

OSINT news roundup: Elon Musk, cultural discord in Ukraine and the metaverse

Stay up-to-date with the latest OSINT news from around the world

generia blog

Establishing an intelligence process for your CTI team

While many cyberthreat intelligence teams rely on the traditional “Intelligence Cycle” or F3EAD models as they are defined, creating a…

Blog updates

Stay updated with the latest posts from the blog
Close
Close