Welcome to the Authentic8 blog

Friday, September 30
An eroding digital face

Virtual machine vs. managed attribution: which is better?

Person working on multiple monitors and laptops
Non-negotiable security needs SOCs to combat rise in phishing
Defining OSINT
What we talk about when we talk about OSINT
Person using smartphone
Beyond Twitter: 6 social media sites you should be using for OSINT research
Web isolation is an enabler, not just a controller
Web isolation is an enabler, not just a controller

Latest blogs

Woman in working in lab at night

The role of OSINT in technological competition with China

The United States is at a critical juncture in its technological competition with China, according to a recent report from the Special…

People with their mouths duct taped

OSINT news roundup: anti-censorship platform, data in the battlefield, gov investment in OSINT

Stay up to date with the latest OSINT news from around the world

Envelope caught on a hook

Defending against phishing, spoofing and business email compromise

Everyone can fall victim to a well-crafted social engineering attack. Learn how hackers use phishing, spoofing and business email…

Advanced Google search tools and techniques

Advanced Google search tools and techniques

Searching with Google means sifting through lots of information. For people who make online research their profession, it is important to…

man at computer at night

Why you should be on the dark web

Many people view the dark web as a place for illegal activities, but anyone in a cyber investigation or analysis role should be looking at…

OSINT News Roundup 9/9

OSINT news roundup: alt video platforms, Russian vacation photos and China’s economic policies

Stay up to date with the latest OSINT news from around the world.

Dark web FAQs

Dark web FAQs: how to access, security precautions and more

Don’t stay in the dark regarding the dark web! We go through some common questions that researchers have about the nefarious corner of the…

Malvertising schemes on the rise

A recent Google malvertising scheme highlights the need for secure research environment

Investigating a malvertising scheme that tricked one of the world’s largest search engines is a dangerous game. Here’s how to do so safely:

man with smoke flare

OSINT news roundup: wildfires and the war, de-platformed extremists, DOD social media policies

Stay up to date with the latest OSINT news from around the world

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Close
Close