Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Cybersecurity

Latest blogs

Topic : Cybersecurity
  • --Any--
  • Managed attribution
  • OSINT
  • Intel and evidence
  • Cybersecurity
  • Dark web
  • Web isolation

5 Steps for secure malware analysis

Malware analysis is a tricky process. Incorrect handling leads to accidental self-exposure, which can be devastating depending on where the…

generia blog

Practice safe SECs: Cyber intelligence experts on building safe operational security and information security practices

What is operational security? Why is it important for the CISO? What’s an intelligence cycle, and how do you successfully execute its data…

Gaining efficiency in the overloaded SOC

Email-based and web-based attacks have unnecessarily overloaded SOCs with incidents to investigate and taken attention away from truly…

generia blog

Election security: Defending our democracy against well-resourced adversaries

Election interference is about more than hacking voting machines. Hear from the experts on the role social media and other channels play…

generia blog

The best defense is a good OSINT

Malicious actors affiliated with China’s Ministry of State Security (MSS) are utilizing publicly available data to identify vulnerabilities…

generia blog

Combating malware in 2020: process, trends and tools

Adversaries are continuously honing their skills, planning for their next attack. How to stay one step ahead? The right framework prepares…

generia blog

How to use Pastebin for cyberthreat intelligence research

A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering…

generia blog

vBulletin 5: zero-day from imperfect patch

Popular forum software platform vBulletin faced a brand new remote code execution zero-day vulnerability. The culprit: an imperfect patch…

generia blog

Handbook: Tools, tips and tricks for threat hunters

A new manual published by Authentic8 helps threat hunters fill critical gaps and hone their tradecraft.

Blog updates

Stay updated with the latest posts from the blog
Close
Close