Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest blogs

cyber intel brief

Cyber Intel Brief: Cisco ASA zero-days, supply chain breaches, ransomware attacks

This week’s Cyber Intel Brief covers Cisco ASA zero-day exploits with ROM-level persistence, major supply chain breaches and ransomware…

Investigating on Signal

Investigating on Signal

Learn how Signal works and inspect the different ways in which OSINT gatherers can collect practical intelligence from the platform.

phishing workflow

Advanced email phishing analysis: SOC investigation workflow

Discover how SOC security teams can investigate phishing emails using advanced methods beyond automated tools.

cyber intel brief

Cyber Intel Brief: SonicWall compromise, Botnet DDoS surge, APT41 espionage

This week’s Cyber Intel Brief uncovers SonicWall cascade breaches, a record-breaking 11.5 Tbps botnet DDoS, and APT41’s latest espionage…

Investigating on GitHub

Investigating on GitHub

Discover how GitHub’s vast code repositories and social features make it a valuable OSINT resource for uncovering sensitive data, technical…

cyber intel brief

Cyber Intel Brief: Patch Tuesday flaws, MS-ISAC funding cuts, AI-powered APTs

This week’s cyber intel brief covers Microsoft vulnerabilities, MS-ISAC funding cuts, and AI-driven APT activity threatening critical…

Two police officers observing a digital interface with various chat bubbles and icons, symbolizing online communication or monitoring.

OSINT for border security: how analysts can deploy open-source techniques

Fortifying the frontline: A practical guide to using OSINT for modern border security

cyber intel brief

Cyber Intel Brief: CISA-known vulnerabilities, Android zero-day and supply chain attacks

Stay up to date the most pressing cyber threats, emerging trends and what they mean for enterprise security, critical infrastructure and…

bitcoin

Cryptojacking 101

Explore how cybercriminals exploit cryptojacking to hijack computing resources for cryptocurrency mining, detailing attack methods, impacts…

silo logo

Start your 30-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations.

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog
Close
Close