You are now subscribed.
Stay up-to-date with the latest OSINT news from around the world
Users surfing the web on traditional browsers has been the thorn in the side of cybersecurity teams since the dawn of malware. Web isolation completely neutralizes this risk.
There are a lot of resources out there to help researchers. Here are Authentic8’s 3 online investigation best practices to stay productive, secure and effective.
When trying to determine if you should begin a dark web investigation, ask yourself these three questions concerning content, risk and precautions.
Fake vaccination cards have popped up on online marketplaces thanks to opportunistic fraudsters, bare-bones documentation, and populations eager to bypass COVID restrictions.
Why you should utilize the dark web in your investigation, where to begin and how to protect yourself (and your company) along the way.
What is the dark web and how does it vary from the internet most of us use everyday? Which darknet should I use for my investigation? And how can I access it safely?
Use data aggregators to pull together info from courthouses across the country, add extensions to better utilize video and images and safely search social media
G2 released its Summer 2021 reports, and — based on verified Authentic8 customer reviews — Silo is now considered a Leader in the Browser Isolation category.
What’s the difference between misattribution vs. managed attribution? We look at the levels of control each type of attribution provides online investigators.