Quantcast
Channel: Recorded Future
Browsing all 78 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

POS Malware Overview for the 2014 Holiday Shopping Season

Almost a year has passed since the infamous Target breach that took place during the 2013 holiday shopping season, resulting in the digital theft of an unprecedented 70 million consumer credit cards...

View Article


Image may be NSFW.
Clik here to view.

New Research Shows Most Vulnerabilities Exploited in About a Week

Recorded Future research published in “Week to Weak: The Weaponization of Cyber Vulnerabilities” identified the short window of time system administrators have before announced software vulnerabilities...

View Article


Image may be NSFW.
Clik here to view.

Tracking Moving Targets: Exploit Kits and CVEs

One year ago a notorious programmer Paunch, who coded the Blackhole exploit kit, was arrested and charged for the distribution and sale of his wares. Blackhole was an epic Russian exploit kit, rented...

View Article

Image may be NSFW.
Clik here to view.

Recorded Future Integrates With HP ArcSight for Threat Intelligence Automation

We are excited to launch our new integration with HP ArcSight security information and event management (SIEM) solution. With this integration, customers using HP ArcSight can gain broad context about...

View Article

Image may be NSFW.
Clik here to view.

Bridging the Gap Between IT Security and the Corporate Office

Editors Note Woody is the founder of Weathered Security. He helps companies meet information security challenges that aren’t just hard technologically, but also can be hard to clearly communicate...

View Article


Image may be NSFW.
Clik here to view.

Give Your Cyber Intelligence Dashboards a Facelift With These Advanced Chart...

This is the third post in our blog series, “Visualizing Cyber Intelligence.” In the cyber security world, charts and dashboards are indispensable. Yet, few analysts take the time to consider which is...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security in 2015: Tom Davenport’s Optimistic View in the Wall Street...

By all accounts, 2014 has been a very active year for cyber security with multiple high-profile breaches culminating with the Sony Pictures incident. Going into 2015, the spotlight on both cyber...

View Article

Image may be NSFW.
Clik here to view.

Improved Recorded Future Transforms for Maltego Now Available

Since the November general release of our Maltego integration, we’ve had strong interest and uptake from threat intelligence analysts. We’ve also heard great ideas for improving and expanding the...

View Article


Image may be NSFW.
Clik here to view.

Lizard Squad: Two Bot Thugs

Analysis Summary Web intelligence has led to an analysis of Lizard Squad’s Linux botnet, LizardStresser or lizardstresser.su. Further link analysis of an email address associated with LizardStresser...

View Article


Image may be NSFW.
Clik here to view.

#JeSuisCharlie Movement Leveraged to Distribute DarkComet Malware

Analysis Summary DarkComet malware found to be exploiting French-speaking targets and distributed using the #JeSuisCharlie hashtag. Recorded Future found DarkComet distribution across hacking forums...

View Article

Image may be NSFW.
Clik here to view.

Exploring IP Ranges With Recorded Future: Are the ‘APT1 Ranges’ Cleaned Up?

In this post we’re exploring new functionality in Recorded Future, which allows users to search the Recorded Future holdings for IP ranges. We’ll examine the IP ranges originally used by APT1 and...

View Article

Image may be NSFW.
Clik here to view.

Live Webinar: 10 Threat Intelligence Goals for Financial Institutions

Please join us and guest, Russell Pierce CISSP, Vice President of Cyber Security and Threat Intelligence at Regions Financial Corporation for a live webinar. Title: 10 Threat Intelligence Goals for...

View Article

Image may be NSFW.
Clik here to view.

How Iran’s Government Gags and Frees Media’s Cyber Coverage

As the Iranian cyber story unfolds on the world stage, a tightly controlled media has revealed what its leadership is thinking. The Iranian government has long been known to control its press. Some...

View Article


Image may be NSFW.
Clik here to view.

Looking at the Past, and to the Future, with Recorded Future

A Chasm Crossing Superstar Recently, Randall Cronk at the request of the MIT Enterprise Forum of Cambridge, sat down with Recorded Future’s CEO, Christopher Ahlberg to learn about the company’s...

View Article

Image may be NSFW.
Clik here to view.

Threat Intelligence in an Active Cyber Defense (Part 1)

Many organizations have bought into the idea of cyber threat intelligence but two questions tend to dominate the discussion: How do you use threat intelligence and when is an organization ready to use...

View Article


Image may be NSFW.
Clik here to view.

Threat Intelligence in an Active Cyber Defense (Part 2)

In this second part of the discussion on threat intelligence (read part one here) we will explore how organizations can incorporate threat intelligence to better achieve security. Threat intelligence...

View Article

Image may be NSFW.
Clik here to view.

Explosive Growth in ISIS Tweets: Arabic Overtakes English

The following analysis was done in collaboration with Sky News. Analysis Summary Analysis by Recorded Future of ISIS-related Twitter activity during 2014 and 2015 shows there has been some dramatic...

View Article


Image may be NSFW.
Clik here to view.

Investigating vBulletin Security Issues with Recorded Future

On January 8, 2015, website security company Sucuri revealed in their blog a serious vulnerability tied to a Search engine optimization (SEO) module for vBulletin. vBulletin is a popular forum engine...

View Article

Image may be NSFW.
Clik here to view.

Monitoring Tor Exit Nodes for Malicious Activity

Recorded Future finds that Tor is rising in popularity as an infrastructure for malicious Web activity. This post will demonstrate how we can create actionable alerts and data exports for defending...

View Article

Image may be NSFW.
Clik here to view.

Cyber Caliphate: ISIS Plays Offense on the Web

Cyber Caliphate’s attack of US Central Command’s Twitter page on January 12, 2015, got the attention of the United States and the world, and brought the cyber threat of ISIS to the forefront. Questions...

View Article
Browsing all 78 articles
Browse latest View live