FILTER BY:
Use Cases
  • Option1
  • Option2
  • Option3
Products
  • Option1
  • Option2
  • Option3
Industries
  • Option1
  • Option2
  • Option3
Sort by
  • Ascending
  • Descending
List-icon List-icon
blog-icon
Blog
By A8 Team October 12, 2020 3 MIN READ

Gaining Efficiency in the Overloaded SOC

The security operations center (SOC) has a wide range of responsibilities to monitor and analyze an organization’s security posture; but today’s threat landscape, technology sprawl and business…

blog-icon
Blog
By A8 Team September 23, 2020 2 MIN READ

Election Security: Defending our Democracy against Well-Resourced Adversaries

Election interference is about more than hacking voting machines. Hear from the experts on the role social media and other channels play Election security is a hot topic, especially with the general…

blog-icon
Blog
By Abel Vandegrift September 21, 2020 2 MIN READ

The Best Defense is a Good OSINT

Malicious actors affiliated with China’s Ministry of State Security (MSS) are utilizing publicly available data to identify vulnerabilities and penetrate government systems, according to a recent …

blog-icon
Blog
By A8 Team September 16, 2020 1 MIN READ

New Training Course on Investigation Enhancement Through Dark Web Use

Beyond the open, accessible internet lies the hidden world of the Dark Web. Because the Dark Web sites are not indexed or searchable by common search engines, they can only be accessed using special…

blog-icon
Blog
By A8 Team September 09, 2020 3 MIN READ

Combating Malware in 2020: Process, Trends and Tools

Adversaries are continuously honing their skills, planning for their next attack. How to stay one step ahead? The right framework prepares you, the latest data empowers you, and the right tools…

blog-icon
Blog
By Abel Vandegrift September 04, 2020 3 MIN READ

NSA Warning on Location Data Exposure: Your web browser is a liability

The National Security Agency recently issued a public warningthat exposed location data from mobile devices can pose a security risk for government personnel, particularly those in the national…

blog-icon
Blog
By A8 Team August 25, 2020 2 MIN READ

Social media account discovery with Genymotion

How can you identify social media accounts through the “suggested friends” function? A practical guide from Authentic8 for OSINT researchers shows the steps.  

blog-icon
Blog
By Abel Vandegrift August 20, 2020 2 MIN READ

CISA: Secure Your Web Browser, It’s Essential

The Department of Homeland Security’s latest guidance for businesses deems a secure web browser “essential” to protecting critical network assets CISA’s Cyber Essentials is a guide for business and…

blog-icon
Blog
By A8 Team August 18, 2020 1 MIN READ

How to use pastebin for cyberthreat intelligence research

A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering leaked or stolen data for sale.  

Close
Close