Protecting Against Election Interference in 2024
While the 2020 election is still hot on everyone’s mind, let’s look ahead changes we can make now to limit election interference in the future ... Read More
Financial Fraud Investigation Tools: Tips and Techniques Handbook Now Available
The handbook compiles guidance from financial crime and AML experts plus practical advice on navigating the dark web for financial fraud investigations ... Read More
From the Experts: Social Media Monitoring and Dark Web Investigations
Two cybersecurity veterans discuss why not just government agencies need to securely investigate threats via social media and the dark web ... Read More
Practice Safe SECs: Cyber intelligence experts on building safe operational security and information security practices
Two cybersecurity veterans from Authentic8 and Forrester share real-life stories from their tenures in public and private sector organizations ... Read More
ON-DEMAND Webinar: Election Security: Defending our Democracy against Well-Resourced Adversaries [Video]
Adversaries have an interest in influencing the U.S. electoral process. What happens in America impacts the political and economic climate around the world ... Read More
Use the Dark Web to Enhance your Investigations – Learn How [Training Course]
The Dark Web offers a wealth of information to help advance research. See how you can use the Dark Web to enhance your investigations ... Read More
Combating Malware in 2020: Process, Trends and Tools [Video]
Stay a step ahead of the adversaries planning their attack. The right framework prepares you, the latest data empowers you, and the right tools enable you ... Read More
Social Media Account Discovery With Genymotion
How can you identify social media accounts through the “suggested friends” function? A practical guide from Authentic8 for OSINT researchers shows the steps ... Read More
How to Use Pastebin for Cyber Threat Intelligence Research
A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering leaked or stolen data ... Read More
Overlooked: “The Biggest Risk of All”
Global cybersecurity spending totals more than $100 billion p.a., with little effect. The Business Security Weekly podcast asked: Why? ... Read More