Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Cyber threat intelligence

Latest blogs

Topic : Cyber threat intelligence
  • --Any--
  • Cyber threat intelligence
  • Incident response
  • OSINT
  • Managed attribution
  • Dark web
  • Intel and evidence
  • Web isolation

10 OSINT tools for cyber threat intelligence

Knowing the best tools to use is a key factor in speeding time-to-insight, especially as the world of cyberthreats and open-source…

Dentists aren't heart surgeons: pitfalls of building an intel team

If you don't want your dentist operating on your leg, NeedleStack guest A.J. Nash asks, why are you putting incident response in charge of…

How OSINT can give you an outsider’s perspective of your network

OSINT is a powerful tool to identify vulnerabilities in your organization. But with all the information out there, how do you zero in on…

Tools, tips and methodologies for cyberthreat intelligence gathering

Our experts offer their recommendations for tools and techniques for every stage of threat intelligence research process.

21 OSINT research tools for threat intelligence investigations

Authentic8 engineers curated a list of the 21 most widely used OSINT research tools for cybersecurity investigations into sites, their…

generia blog

COMB makes billions of leaked credentials easily discoverable

The Compilation of Many Breaches (COMB) has been published on a surface web hacking forum, making 3.2 billion pairs of passwords and emails…

generia blog

Authentic8 and LifeRaft: Simplifying workflow to get to ground truth faster

Integration between our Silo Web Isolation Platform and LifeRaft’s security intelligence solution, Navigator, provides the efficiency,…

generia blog

Cyber threat intelligence: Lack of training, tools, oversight

Cybersecurity Insider’s 2020 Cyber Threat Intelligence Report cites a problematic lack of training, tools, and oversight that could come…

generia blog

What's next in cyber threat intelligence?

In episode 3 of our cyber threat intelligence video series, we discuss (in under 9 minutes) the future of investigation platforms, data…

Blog updates

Stay updated with the latest posts from the blog
Close
Close