Quantcast
Channel: Recorded Future
Browsing all 141 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Update on Syrian Rebel Media Coordinators

You might recall our Guide to Syrian Rebel Media Spokespeople and PR published back in March. Impending foreign entanglements led us to revisit the network of individuals within Syria that shape our...

View Article


Image may be NSFW.
Clik here to view.

Head of Iran’s Cyber Warfare Program Latest Victim in Series of Assassinations

The head of Iran’s cyber warfare program, Mojtaba Ahmadi, was found dead earlier this week with initial evidence suggesting he was assassinated. This is far from the first time that a member of Iran’s...

View Article


The Evolution of An0nGhost (November 2012 – September 2013)

The most infamous cyber collective, Anonymous, remains highly active several years after its inception. A lesser-known group, An0nGhost, is another globally distributed collective of hackers. In...

View Article

Image may be NSFW.
Clik here to view.

Syrian Electronic Army Attacks Linked to Political Statements on Syria

Originally published on October 9, 2013 by Mashable in an article entitled Syrian Electronic Army Attacks Linked to Obama’s Mentions of Syria. From Mashable: The frequency of attacks that the infamous...

View Article

Image may be NSFW.
Clik here to view.

Web Intelligence Shows Early Signs of OpNSA Cyber Campaign, DDoS Attacks...

The U.S. National Security Agency’s website was down for roughly 11 hours on Friday. The agency says the downtime was caused by an error during a routine website update; others believe the NSA was...

View Article


Image may be NSFW.
Clik here to view.

Syrian Electronic Army Continues to Adapt, Targeting Communications Partners

Last weekend, the Syrian Electronic Army again grabbed headlines with a high-profile attack on BarackObama.com. An aspect that caught our attention is how the SEA continues to adapt their methods by...

View Article

Image may be NSFW.
Clik here to view.

Filling the OSINT Void After the World News Connection Feed Shuts Down

The Federation of American Scientist’s blog Secrecy News highlighted several weeks ago the impending loss of the National Technical Information Service’s World News Connection (WNC) newsfeed. The...

View Article

Image may be NSFW.
Clik here to view.

Trade Treaty Draws Ire of Digital Rights Advocates

According to Wikileaks, a proposed trade agreement between 12 countries would infringe upon internet freedom in ways similar to the stalled Stop Online Piracy Act (SOPA). Recalling the fierce response...

View Article


Image may be NSFW.
Clik here to view.

Measuring the Media Impact of Hacktivists

How can we measure the success of hacktivists? Certainly, achievement of a desired political change is the choice outcome. But seeking a non-zero metric, let’s consider the amount of media coverage an...

View Article


Image may be NSFW.
Clik here to view.

Rash of Cyber Threats on Japanese Targets Continues

Hacktivist collective Anonymous recently threatened 22 Japanese websites including prominent government agencies in protest against the annual Taiji dolphin hunt. Though action against these sites has...

View Article

Image may be NSFW.
Clik here to view.

China Restricts East China Sea Airspace Amidst Regional Military...

China over the weekend imposed contentious airspace restrictions over the disputed Senkaku Islands. The event was preceded by a series of regional military partnerships and arms contracts as well as...

View Article

The Complexities of Myanmar’s International Makeover

Our friends at Ethnographic Edge recently published a thoughtful piece on recent economic and media policy developments in Myanmar. Particularly notable are the reminders of complex social pressures...

View Article

Image may be NSFW.
Clik here to view.

Which Hacker Groups Give Warning of Cyber Attacks?

We’ve previously considered media impact as a success criterion for hackers. This led us to report the most media-savvy hacktivists. In their respective ways, groups like the Syrian Electronic Army,...

View Article


Japan, United States Include Cyber Defense in Joint War Exercise

According to reports out of Japan, ongoing Japan Ground Self-Defense Force and U.S. Army joint training exercises include a cyber attack component. The exercise between December 5th and 12th reportedly...

View Article

Image may be NSFW.
Clik here to view.

Iranian Hacktivists Quiet Amid Nuclear Negotiations

While Iran’s Revolutionary Guards have been busy arresting opposition activists for alleged seditious online activities, hacker groups with supposed ties to the Iranian government have been noticeably...

View Article


Image may be NSFW.
Clik here to view.

The Year in Bitcoin Malware and Cybercrime

Where there’s money there’s malware. And as the lights shone brightly on Bitcoin this year, cybercriminals were increasingly active in exploiting security vulnerabilities related to the digital...

View Article

Image may be NSFW.
Clik here to view.

Mass Demonstration Planned for Sunday at Thai PM’s Residence

Thailand’s Prime Minister Yingluck Shinawatra has called for respect of the law as mass demonstrations are planned for Sunday outside of her home. The protest organized by former Thai deputy prime...

View Article


Image may be NSFW.
Clik here to view.

‘Islamic Cyber Resistance’ Breaks Iranian Hacker Silence, Exposes Links to SEA

The freeze on Iranian hacktivist activity during nuclear negotiations was broken last week although it doesn’t appear to be government sponsored. The Islamic Cyber Resistance (ICR), not yet discussed...

View Article

Image may be NSFW.
Clik here to view.

Visualizing RedKit Exploits

The private but popular RedKit exploit kit appears to be experiencing a resurgence based on a report by Kahu Security. Initially spotted back in May 2012, the exploit kit drew attention after...

View Article

Image may be NSFW.
Clik here to view.

Threat Intelligence Webinar: The Spread of POS Malware

The widely publicized data breach at Target put point-of-sale (POS) malware in the spotlight for security teams. Open source research by Recorded Future found POS malware attacks were on the rise even...

View Article
Browsing all 141 articles
Browse latest View live