Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

A8 Team

Latest blogs

Topic : A8 Team
  • --Any--
generia blog

Go-to tools for trust and safety analysts

As the volume of trust and safety issues increases, analysts need the right tools to efficiently conduct successful investigations.

generia blog

Why trust and safety is risky business

Know the risks you take on while conducting a trust and safety investigation, how adversaries could retaliate and how to counteract these…

What is trust and safety?

Trust and safety has become a critical business function for digital platforms and services. We look at why it’s so important, how it works…

generia blog

6 strategies for law enforcement agents who investigate online

The right strategies and resources for conducting OSINT on the surface, deep and dark web can make online investigations more efficient,…

Social media’s value and danger to law enforcement investigations

Social media is increasingly useful to law enforcement investigations. But it, along with other OSINT sources, comes with inherent risks to…

21 OSINT research tools for threat intelligence investigations

Authentic8 engineers curated a list of the 21 most widely used OSINT research tools for cybersecurity investigations into sites, their…

generia blog

COMB makes billions of leaked credentials easily discoverable

The Compilation of Many Breaches (COMB) has been published on a surface web hacking forum, making 3.2 billion pairs of passwords and emails…

What’s in your digital fingerprint and how to control it

Your digital fingerprint — or browser fingerprint — may seem like innocuous details. But for online investigators, especially in law…

Essential tools for improving surface and dark web research

Leveraging these easy-to-use tools for surface as well as dark web investigations can help improve the quality and speed of your research.

Blog updates

Stay updated with the latest posts from the blog
Close
Close