Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.
In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.
AJ investigates potential threats by tracking down suspicious activity related to 'Task Force 43' on the dark web. Watch how he navigates through dark web resources to uncover concerning details about a possible hitman service, demonstrating the ease and speed of using Silo for high-stakes cyber investigations.
Financial institutions are at the forefront of the battle against financial crimes such as money laundering and fraud. They are also the targets of insider attacks and phishing. SOC, CTI, and financial fraud investigation teams must navigate a complex and ever-evolving threat landscape.