Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.
In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.
Monitoring social media for threats shouldn’t mean getting locked out — but for many security teams, it does.
In this video, AJ Nash, Digital Intelligence Advocate at Authentic8, explains why platforms flag legitimate monitoring activity, why common workarounds fail, and how teams can maintain reliable access without disruption.
Misinformation and malinformation campaigns are getting more advanced, using deepfakes, bots, and coordinated fake accounts to target organizations. Detecting them isn’t enough. Teams need secure, invisible investigation tools to uncover and stop the threat.
AJ Nash, Digital Intelligence Advocate for Authentic8, shares insights on how organizations can safely investigate and respond.
Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.
Brand sabotage is a growing threat that weaponizes the trust companies work hard to build. In this video, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how phishing, counterfeiting, and coordinated disinformation campaigns damage reputations and impact revenue — and why traditional brand protection often reacts too late.
AJ Nash explains how modern cyberattacks are won through reconnaissance long before initial access, with attackers mapping infrastructure, targeting privileged accounts, and leveraging OSINT to strike with precision. Citing CrowdStrike data showing breakout times as low as 48 minutes (and even 51 seconds), he warns that defenders are often racing the clock after attackers already have a head start. He outlines how OSINT red teaming and counter-reconnaissance can help organizations shift from reactive defense to becoming “moving hardened objectives.”
AJ Nash explains why discovering a breach can shift advantage to attackers, citing CrowdStrike data showing breakout times as low as 48 minutes—and even 51 seconds. He argues that response plans must account for sophisticated adversaries who, once alerted, may deploy secondary payloads, destroy forensic evidence, or escalate. Nash outlines “the quiet pursuit”: keeping investigative activity isolated from production systems, making research appear to originate outside the compromised network, and maintaining an internal audit trail, so teams can gather intelligence and respond decisively without triggering escalation.