Welcome to the Authentic8 blog

Monday, February 6
Person in a foggy field with many open doors

Beating censorship: putting the “open” in open source

How EXIF data can further your research
A picture worth a thousand words: How EXIF data can further your research
AI for OSINT
What we can find when we know where to look: applying AI to social OSINT
What can Ukraine tell us about Taiwan?
What can Ukraine tell us about Taiwan?
Malvertising schemes on the rise
A recent Google malvertising scheme highlights the need for secure research environment

Latest blogs

generia blog

VPN for Secure and Private Web Access? Think Again.

Many believe a VPN will protect users against online privacy violations and web-borne exploits. But how far can you really trust VPN? Many…

generia blog

VPN and privacy: what nobody told you

Did you know that ISPs can use VPN to spy on you? Third parties taking advantage of your VPN’s many flaws for nefarious purposes. We…

generia blog

Financial Services: Blindspot Browser

For regulated investment firms, the SEC’s Office of Compliance Inspections and Examinations (OCIE) has prioritized “cybersecurity with an…

generia blog

Quick dissections: Collections 2-5

The Collection #1 loot archive of stolen credentials is only the tip of the archive. All 5 collections contain more than 1TB of raw…

generia blog

Why Your Defender’s Paradigm Isn’t Working Anymore

Why does it seem like despite the ever-evolving technology and the billions of dollars being spent on cybersecurity, that the attackers are…

generia blog

Interview: SEC Compliance and the Internet

Key Issues for Investment Management Firms What are the challenges regulated investment management firms are facing when using the…

silo logo

Start your 7-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Close
Close