Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest blogs

generia blog

How to use Pastebin for cyberthreat intelligence research

A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering…

generia blog

Overlooked: "The biggest risk of all"

How is it that global spending on cybersecurity totals more than $100 billion per year, and IT has so little to show for it? Authentic8's…

generia blog

vBulletin 5: zero-day from imperfect patch

Popular forum software platform vBulletin faced a brand new remote code execution zero-day vulnerability. The culprit: an imperfect patch…

generia blog

Modern CTO interview: Flipping turtles

Things move fast at Authentic8, most of the time. And if they don’t? That’s when leaders shine as enablers and get things back on track.…

generia blog

Handbook: Tools, tips and tricks for threat hunters

A new manual published by Authentic8 helps threat hunters fill critical gaps and hone their tradecraft.


SPAs: attack surface-are-us

Web designers love single-page apps (SPAs) because they load quickly and conceal connection deficiencies. They are also the cause of data…

generia blog

Do financial crime investigators have a bull’s eye on their backs?

The COVID-19 pandemic seems like a double whammy for financial crime investigators. While online fraud has skyrocketed, teams are still…

generia blog

"Almost like a virtual safe room"

Are you following Smashing Security, the award-winning podcast with "a helpful and hilarious take on the week's tech SNAFUs" (tag line)?…

generia blog

CMMC: Still on track?

A landmark effort by the Department of Defense to shore up cybersecurity across its 300,000+ contractor base has managed to stay mostly on…

silo logo

Start your 30-day free trial of Silo for Research


The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog