Welcome to the Authentic8 blog

Friday, May 26
Red silhouette shows bombers and cloud moving over Ukrainian territory

Ukraine: 1 year after an unexpected invasion, OSINT continues to shed light on the past, present and future of the conflict

image: one balloon lit up floating above gray balloons
One size won’t fit all: Clearing the air on OSINT methodology
cyber graphic of hexagons
5 tips for OSINT on the dark web
Man on laptop sitting on paper airplane
FAQ: web isolation and the zero-trust maturity model
magnifying glass
7 search engines for better OSINT

Latest blogs

generia blog

Naked and exposed: stop investigating online without managed attribution

Everything you wanted to know about browser fingerprint, managed attribution and non-attribution — but didn’t know who to ask.

generia blog

OSINT data collection: you still need humans, but automation is well worth the investment

OSINT data collection automation ensures that teams are gathering the most relevant data as quickly and efficiently as possible, while…

generia blog

Tradecraft webinar: secure and effective financial crime investigations

Learn how to use the dark web for your financial crime investigations. An introductory webinar for beginners and those who are curious.

generia blog

OSINT OPSEC: not just for government anymore

OSINT OPSEC is critical for any type of investigator to protect their mission, organization and themselves from cyber adversaries.  

generia blog

New Silo-Splunk integration for SOCs automates log correlation

New Silo for Safe Access feature provides Splunk integration for SOCs to monitor employee web and SaaS app access on any device, managed or…

generia blog

New Splunk integration for threat hunting, other online research

New Silo for Research feature provides Splunk integration for threat hunting and other online research, so enterprises maintain an…

generia blog

Incident response to APTs: stop data loss, maintain connectivity, find the adversary

When performing incident response to APTs, balance priorities of fully rooting out adversaries and limiting disruption to the business.

What VPNs and Incognito Mode still give away in your online identity

What VPNs and Incognito Mode still give away in your online identity

VPN and Incognito Mode reveal a ton of data to visited websites that managed attribution solutions can conceal and manipulate for analyst…

generia blog

Solving the recurring collection and time tradecraft issues in online investigations

Collector Add-On: Silo for Research enhances researcher workflows to automate recurring collection of data at appropriate times to avoid…

silo logo

Start your 30-day free trial of Silo for Research


The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog