Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest blogs

generia blog

Combating malware in 2020: process, trends and tools

Adversaries are continuously honing their skills, planning for their next attack. How to stay one step ahead? The right framework prepares…

generia blog

NSA warning on location data exposure: Your web browser is a liability

The National Security Agency recently issued a public warning that exposed location data from mobile devices can pose a security risk…

generia blog

Social media account discovery with Genymotion

How can you identify social media accounts through the “suggested friends” function? A practical guide from Authentic8 for OSINT…

generia blog

CISA: Secure your web browser, it’s essential

The Department of Homeland Security’s latest guidance for businesses deems a secure web browser “essential” to protecting critical…

generia blog

How to use Pastebin for cyberthreat intelligence research

A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering…

generia blog

Overlooked: "The biggest risk of all"

How is it that global spending on cybersecurity totals more than $100 billion per year, and IT has so little to show for it? Authentic8's…

generia blog

vBulletin 5: zero-day from imperfect patch

Popular forum software platform vBulletin faced a brand new remote code execution zero-day vulnerability. The culprit: an imperfect patch…

generia blog

Modern CTO interview: Flipping turtles

Things move fast at Authentic8, most of the time. And if they don’t? That’s when leaders shine as enablers and get things back on track.…

generia blog

Handbook: Tools, tips and tricks for threat hunters

A new manual published by Authentic8 helps threat hunters fill critical gaps and hone their tradecraft.

silo logo

Start your 30-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog
Close
Close