Welcome to the Authentic8 blog

Friday, November 25
Dark web FAQs

Dark web FAQs: how to access, security precautions and more

Venti latte with an extra shot of malware
Why conducting sensitive online research from Starbucks is a bad idea
Person using smartphone
Beyond Twitter: 6 social media sites you should be using for OSINT research
Web isolation is an enabler, not just a controller
Web isolation is an enabler, not just a controller
man with smoke flare
OSINT news roundup: wildfires and the war, de-platformed extremists, DOD social media policies

Latest blogs

Defining OSINT

What we talk about when we talk about OSINT

What is OSINT? Defining a term for a living, evolving practice can be a challenge, subject to who you ask, what you’re referring to and a…

Person using smartphone

Beyond Twitter: 6 social media sites you should be using for OSINT research

Social media is rife with open-source information that can prove vital to OSINT, but are you using all the platforms at your disposal?

Private security guard

OSINT news roundup: China eyes on Ukraine, an end to nuclear secrecy, private security’s misinformation

While the world’s eyes are on Ukraine, one nation is paying special attention: China. The global super power with territorial axes to grind…

People standing around a computer

Silo by Authentic8 ranked top 5 G2 Leader in threat intelligence software

G2 has released their Summer 2022 reports, and — based on verified customer reviews — Silo remains a Leader in the Threat Intelligence…

Microphone on a desk

Reporting live from the dark web

A conversation with the host of the Darknet Diaries podcast Jack Rhysider

Wheat fields in Ukraine

OSINT news roundup: attacks on crops, an “imminent” carrier launch and extremism on social media

Stay up to date with the latest OSINT news from around the world

Person working on multiple monitors and laptops

Non-negotiable security needs SOCs to combat rise in phishing

An unprecedented level of cyber attacks and phishing attempts makes the security needs of SOC teams greater than ever

surface vs dark

Surface web vs. dark web: not as black and white as it may seem

What was once a foreign concept to many internet users, the dark web is making its presence known on the surface web.

The dark web story told from the inside

The dark web story – told from the inside

Interview with a true crime writer and investigative journalist Eileen Ormsby

silo logo

Start your 7-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Close
Close