FILTER BY:
Use Cases
  • Option1
  • Option2
  • Option3
Products
  • Option1
  • Option2
  • Option3
Industries
  • Option1
  • Option2
  • Option3
Sort by
  • Ascending
  • Descending
List-icon List-icon
blog-icon
Blog
By A8 Team September 29, 2021 7 MIN READ

21 OSINT research tools for threat intelligence investigations

Authentic8 engineers curated a list of the 21 most widely used OSINT research tools for cybersecurity investigations into sites, their users and owners.

blog-icon
Blog
By A8 Team September 22, 2021 3 MIN READ

COMB makes billions of leaked credentials easily discoverable

The Compilation of Many Breaches (COMB) has been published on a surface web hacking forum, making 3.2 billion pairs of passwords and emails easily searchable.

blog-icon
Blog
By Thom Kaye September 21, 2021 4 MIN READ

Use OSINT to Contextualize GEOINT

The ZAPAD-21 military exercise is a prime example of an event where GEOINT can benefit from the added context of OSINT.

blog-icon
Blog
By A8 Team September 17, 2021 4 MIN READ

What’s in your digital fingerprint and how to control it

Your digital fingerprint — or browser fingerprint — may seem like innocuous details. But for online investigators, especially in law enforcement, they could make or break your case.

blog-icon
Blog
By Abel Vandegrift September 15, 2021 3 MIN READ

4 things you shouldn’t do on the dark web

Avoid a world of trouble by following these four simple recommendations of what not to do on the dark web during online investigations.

blog-icon
Blog
By Abel Vandegrift September 07, 2021 3 MIN READ

Best practices for creating a dark web access policy

Protect your company and employees by creating a dark web access policy to set protocol for investigations to mitigate security and legal challenges.

blog-icon
Blog
By Adam Huenke September 02, 2021 3 MIN READ

Mitigating risk in SOC investigations with managed attribution

Cloud-based web isolation to neutralize cyberthreats in employees’ everyday web activity — but how do SOCs secure their own online investigations that require them to interact with malicious content…

blog-icon
Blog
By A8 Team September 01, 2021 5 MIN READ

Essential tools for improving surface and dark web research

Leveraging these easy-to-use tools for surface as well as dark web investigations can help improve the quality and speed of your research.

blog-icon
Blog
By Adam Huenke August 26, 2021 3 MIN READ

Risk mitigation with web isolation

Users surfing the web on traditional browsers has been the thorn in the side of cybersecurity teams since the dawn of malware. Web isolation completely neutralizes this risk.

Close
Close