anonymity
Use the Dark Web to Enhance your Investigations – Learn How [Training Course]
The Dark Web offers a wealth of information to help advance research. See how you can use the Dark Web to enhance your investigations ...
How to Use Pastebin for Cyber Threat Intelligence Research
A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering leaked or stolen data ...
Handbook: Tools, Tips & Tricks for Threat Hunters
Cyber Threat Intelligence Handbook: A practical guide with tools, tips and tricks published by Authentic8 helps threat hunters hone their tradecraft ...
Do Financial Crime Investigators Have a Bull’s Eye on their Back?
Online fraud has skyrocketed during the COVID-19 pandemic. A survey among financial crime specialists asked: Are they properly equipped for their mission? ...
“Almost Like a Virtual Safe Room”
On the award-winning Smashing Security podcast, Authentic8 Co-Founder and CEO Scott Petry discussed Silo web isolation, online investigations and compliance ...
Is My Data for Sale on the Dark Web?
Is your company's corporate network access for sale, too? Find out now. New research shows: remote work vulnerabilities have dark web marketplaces booming ...
Social Media: How to Quickly Investigate on TikTok
How to safely, securely and anonymously access and analyze TikTok content without downloading the app on your phone ...
Cyber Threat Intelligence: How to Use OSINT
Video: What organizations benefit from formal Cyber Threat Intelligence (CTI) and Open Source Intelligence (OSINT) programs? What's the recommended playbook? ...
Ideas That Become Obvious In Hindsight
Award-winning tech journalist Leo Laporte's interview with Scott Petry, Co-founder and CEO of Authentic8, maker of the Silo Cloud Browser ...
How to Detect Browser Extensions
Is it possible to detect what browser extensions I have installed? How unsafe and 'oversharing' addons give online attackers, unethical online marketers and snoops a leg up ...

