You are now subscribed.
Stay up to date with the latest OSINT news from around the world
What was once a foreign concept to many internet users, the dark web is making its presence known on the surface web.
The right strategies and resources for conducting OSINT on the surface, deep and dark web can make online investigations more efficient, secure and compliant.
Social media is increasingly useful to law enforcement investigations. But it, along with other OSINT sources, comes with inherent risks to access.
Authentic8 engineers curated a list of the 21 most widely used OSINT research tools for cybersecurity investigations into sites, their users and owners.
The Compilation of Many Breaches (COMB) has been published on a surface web hacking forum, making 3.2 billion pairs of passwords and emails easily searchable.
The ZAPAD-21 military exercise is a prime example of an event where GEOINT can benefit from the added context of OSINT.
Your digital fingerprint — or browser fingerprint — may seem like innocuous details. But for online investigators, especially in law enforcement, they could make or break your case.
Avoid a world of trouble by following these four simple recommendations of what not to do on the dark web during online investigations.
Protect your company and employees by creating a dark web access policy to set protocol for investigations to mitigate security and legal challenges.
Cloud-based web isolation neutralizes cyberthreats in employees’ everyday web activity — but how do SOCs secure their own online investigations that require them to interact with malicious content…