Welcome to the Authentic8 blog

Wednesday, November 30
Dark web FAQs

Dark web FAQs: how to access, security precautions and more

Venti latte with an extra shot of malware
Why conducting sensitive online research from Starbucks is a bad idea
Person using smartphone
Beyond Twitter: 6 social media sites you should be using for OSINT research
Web isolation is an enabler, not just a controller
Web isolation is an enabler, not just a controller
man with smoke flare
OSINT news roundup: wildfires and the war, de-platformed extremists, DOD social media policies

Latest blogs

Malvertising schemes on the rise

A recent Google malvertising scheme highlights the need for secure research environment

Investigating a malvertising scheme that tricked one of the world’s largest search engines is a dangerous game. Here’s how to do so safely:

man with smoke flare

OSINT news roundup: wildfires and the war, de-platformed extremists, DOD social media policies

Stay up to date with the latest OSINT news from around the world

Venti latte with an extra shot of malware

Why conducting sensitive online research from Starbucks is a bad idea

Free Wi-Fi may seem like a convenient way to alter your digital fingerprint and avoid tipping off investigative targets, but the risks…

Conveyor belts of boxes

Automating collection for SOC investigations

Not just the realm of TIPs. Automated collection of deeper-dive online research related to SOC investigations is an important tool in an…

Man using a laptop

5 key reasons why VPN alone won't protect you or your research

What you need to know about VPNs and the security implications that come with relying on it alone.

OSINT news roundup

OSINT news roundup: Pelosi’s Taiwan visit, Russian radio codes and search tips

Stay up to date with the latest OSINT news from around the world.

OSINT in the FY23

OSINT in the FY23 Defense and Intelligence Authorization Bills

We break down the intelligence authorization bills currently moving through the U.S. House and Senate. If passed, they could help bolster…

China's role in Fentanyl production

OSINT news roundup: China’s Fentanyl role, private military groups and “Shields Up”

This week’s OSINT news includes a review of the Cybersecurity and Infrastructure Agency’s (CISA) “Shields Up” campaign, focused on…

An eroding digital face

Virtual machine vs. managed attribution: which is better?

Researchers have lots of options to manage their anonymity while performing online investigations, but not all solutions are created…

silo logo

Start your 7-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Close
Close