Quantcast
Channel: Recorded Future
Browsing all 72 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How Pace University is Building the Next Generation of Cyber Security Analysts

Editor’s Note Cyber threat intelligence is a young area of security. Relatively few universities offer formalized instruction to prepare analysts for this specific problem set, and these curriculums...

View Article


Image may be NSFW.
Clik here to view.

Bashed and Shellshocked: Early Reports of Exploitation in the Wild

Lots of IT security teams are at work right now to patch the Shellshock vulnerability (CVE-2014-6271) ASAP – while keeping an eye on their threat intelligence sources for exploitation in the wild. And...

View Article


Image may be NSFW.
Clik here to view.

Rapidly Discover IOCs With Maltego and Recorded Future

Discovering and validating known indicators of compromise (IOCs) can be a daunting task for any cyber security operation. This is especially true if you do not have the luxury to pay for all of the...

View Article

Image may be NSFW.
Clik here to view.

Shellshock and Xen Remediation

This blog post summarizes our remediation of two high-profile software vulnerabilities. Shellshock CVE-2014-6271 Remediation On September 24, 2014, a security vulnerability dubbed Shellshock...

View Article

Image may be NSFW.
Clik here to view.

Why CISOs Are Investing in Cyber Threat Intelligence

Recently, we had the wonderful opportunity to host a webinar featuring Threat Intelligence Expert and Principal Analyst, Rick Holland of Forrester Research, Inc. Rick discussed why a chief information...

View Article


Image may be NSFW.
Clik here to view.

Discovering Sandworm IOCs With Recorded Future Maltego Transforms

Yesterday, iSIGHT Partners published a blog post announcing the discovery of CVE-2014-4114, a zero-day vulnerability used in a Russian cyber-espionage campaign. The campaign was dubbed Sandworm and...

View Article

Image may be NSFW.
Clik here to view.

221 of the Fortune 500 Have Exposed Credentials on the Web

Recorded Future analysis published in the “The Fortune 500’s Unfortunate 221″ threat intelligence report identified employee credential exposures for at least 44% of major US companies in 2014. These...

View Article

Image may be NSFW.
Clik here to view.

Exposed Corporate Credentials on the Open Web, a Real Security Risk

Last Friday, a New York Times article described how the recent online attack against JPMorgan was possibly connected to a data breach on a third-party website. The target mentioned in the article is...

View Article


Image may be NSFW.
Clik here to view.

3 Important Trends for ICS/SCADA Systems

Last week, we presented a webinar with the ICS/SCADA experts from Cimation. Industrial control systems (ICS) are the “nervous systems” that manage facilities and operations, everything from robotic...

View Article


Image may be NSFW.
Clik here to view.

Recorded Future Transforms for Maltego Now Available

We’re delighted to announce the release of Recorded Future transforms for Maltego! Why You Care These transforms make it simple and fast to fuse our information into Maltego investigations. If you’ve...

View Article

Image may be NSFW.
Clik here to view.

New Malicious Networks Discovered in Dark Hotel Malware Campaign

Analysis Summary Recorded Future discovered technical indicators that suggest malware used in the Dark Hotel campaign has been in the wild since 2009. The Dark Hotel malware campaign has links to...

View Article

Image may be NSFW.
Clik here to view.

Breaking the Code on Russian Malware

Russia poses a serious cyber threat to industrial control systems (ICS), pharmaceutical, defense, aviation, and petroleum companies. Russian government cyber operations aim to use malware to steal...

View Article

Image may be NSFW.
Clik here to view.

Organizing Big Data for Analysis

Since 2009, we have been building an index of the web for intelligence analysis. Consequently, we have lots of data at Recorded Future (billions of data points). But where does the data come from? And...

View Article


Image may be NSFW.
Clik here to view.

POS Malware Overview for the 2014 Holiday Shopping Season

Almost a year has passed since the infamous Target breach that took place during the 2013 holiday shopping season, resulting in the digital theft of an unprecedented 70 million consumer credit cards...

View Article

Image may be NSFW.
Clik here to view.

New Research Shows Most Vulnerabilities Exploited in About a Week

Recorded Future research published in “Week to Weak: The Weaponization of Cyber Vulnerabilities” identified the short window of time system administrators have before announced software vulnerabilities...

View Article


Image may be NSFW.
Clik here to view.

Tracking Moving Targets: Exploit Kits and CVEs

One year ago a notorious programmer Paunch, who coded the Blackhole exploit kit, was arrested and charged for the distribution and sale of his wares. Blackhole was an epic Russian exploit kit, rented...

View Article

Image may be NSFW.
Clik here to view.

Recorded Future Integrates With HP ArcSight for Threat Intelligence Automation

We are excited to launch our new integration with HP ArcSight security information and event management (SIEM) solution. With this integration, customers using HP ArcSight can gain broad context about...

View Article


Image may be NSFW.
Clik here to view.

Bridging the Gap Between IT Security and the Corporate Office

Editors Note Woody is the founder of Weathered Security. He helps companies meet information security challenges that aren’t just hard technologically, but also can be hard to clearly communicate...

View Article

Image may be NSFW.
Clik here to view.

Give Your Cyber Intelligence Dashboards a Facelift With These Advanced Chart...

This is the third post in our blog series, “Visualizing Cyber Intelligence.” In the cyber security world, charts and dashboards are indispensable. Yet, few analysts take the time to consider which is...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security in 2015: Tom Davenport’s Optimistic View in the Wall Street...

By all accounts, 2014 has been a very active year for cyber security with multiple high-profile breaches culminating with the Sony Pictures incident. Going into 2015, the spotlight on both cyber...

View Article
Browsing all 72 articles
Browse latest View live