Quantcast
Channel: Recorded Future
Browsing all 141 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Syrian Electronic Army Phishing in Turkey, Turkish Hackers Retaliate

The Syrian Electronic Army was busy playing both offense and defense last week. They reportedly gained access to multiple Microsoft assets including social media channels and the Official Microsoft...

View Article


Tripwire Series on Cyber Intelligence

Tripwire’s State of Security blog is running an interesting series on cyber intelligence with Robert M. Lee, an active-duty U.S. Air Force Cyberspace Operations Officer and co-founder of Dragos...

View Article


Image may be NSFW.
Clik here to view.

Observing the Ebb and Flow of Cross-Platform Malware

Recent news of a cross-platform, Java-based backdoor used to create a DDoS botnet (ThreatPost authored a valuable brief) prompted us to revisit a late November report by MobiStealth on the emergence of...

View Article

Image may be NSFW.
Clik here to view.

Anti-Israel Hackers Parastoo Prepare for OpIsrael Anniversary

Anti-Israel hacker organization Parastoo last week announced its intention to join #OpIsrael2, also touted as OpIsrael Birthday, to commence in April. The group is targeting US, NATO, and ISAF...

View Article

Image may be NSFW.
Clik here to view.

How Governments Can Use Web Intelligence for Insights

The following interview is with Simon Thacker and is from our Web Intelligence Perspectives Series. Simon is head of strategic early warning for the UK Cabinet Office. What is it about web intelligence...

View Article


Image may be NSFW.
Clik here to view.

Working With ThreatConnect to Give Cyber Attacks Context

Recorded Future recently partnered with our friends at ThreatConnect to provide geopolitical context to their excellent analysis on cyber espionage in the South China Sea. We love this quote by the...

View Article

Image may be NSFW.
Clik here to view.

4 Ways to Stop APT Attacks Using Web Intelligence

In case you missed it, below is a brief recap of our webinar yesterday with Oren Falkowitz. Oren began with a baseline, observing most efforts to combat APTs (Advanced Persistent Threats) focus on...

View Article

Image may be NSFW.
Clik here to view.

Dan Geer on Web Intelligence and Cyber Security

The following interview is with Dan Geer and is from our Web Intelligence Perspectives Series. Dan is currently the chief information security officer for In-Q-Tel. What is it about web intelligence...

View Article


Image may be NSFW.
Clik here to view.

Shedding Light on STTEAM

Researchers from Fidelis Security in February reported a newly identified cyber campaign dubbed STTEAM (PDF) found to be targeting oil and gas companies in the Middle East. The Fidelis team provided...

View Article


Image may be NSFW.
Clik here to view.

Understanding Moroccan Politics With Open Source Intelligence

Analysis Summary Open source intelligence indicates political tensions surrounding the Moroccan Justice and Development Party steadily increased between 2012 and 2013. Open source intelligence also...

View Article

Image may be NSFW.
Clik here to view.

Iranian Hacker Network Linked to Familiar Group?

News of an Iranian hacker network targeting US government officials made waves yesterday after being uncovered by iSIGHT Partners. Buried deep in Reuters’ report is a password used by the group:...

View Article

Image may be NSFW.
Clik here to view.

Cyber Threat Landscape: Basic Overview and Attack Methods

This is the first post in our blog series that aims to provide a basic overview of the contemporary cyber threat landscape. The flourishing synergy between the internet and its beneficiaries, who use...

View Article

Image may be NSFW.
Clik here to view.

Cyber Threat Landscape: Attackers and Operations

This is the second post in our blog series that aims to provide a basic overview of the contemporary cyber threat landscape. In 1996, a group of RAND researchers published a seminal book on the then...

View Article


Image may be NSFW.
Clik here to view.

Cyber Threat Landscape: Forecast

This is the third post in our blog series that aims to provide a basic overview of the contemporary cyber threat landscape. According to United Nations Office on Drugs and Crime’s (UNODC) Comprehensive...

View Article

Image may be NSFW.
Clik here to view.

How to Use STIX for Automated Sharing and Graphing of Cyber Threat Data

MITRE, a not-for-profit organization with offices near Boston and Washington, D.C., has developed several interrelated toolkits to enable sharing of cyber threat intelligence between trusted parties....

View Article


Image may be NSFW.
Clik here to view.

Navigating the Future With Web Data: Christopher Ahlberg at TEDxCambridge 2014

Is it really possible to know the future? Recorded Future CEO Christopher Ahlberg says yes, if we organize the web for analysis, rather than search. With those insights in hand, leaders can make...

View Article

Image may be NSFW.
Clik here to view.

Is it Possible to Use Web Intelligence to Forecast International Crisis?

By using Recorded Future in conjunction with traditional ethnographic techniques, it is possible for us to significantly increase our accuracy in forecasting international and diplomatic crisis. This...

View Article


Image may be NSFW.
Clik here to view.

Recap: Spring 2014 Product Improvements

Now that summer is here, let’s recap the Recorded Future product improvements we rolled out over the last three months. With our SaaS approach, we deliver improvements in weekly increments, along with...

View Article

Image may be NSFW.
Clik here to view.

4 Ways Alert Logic Leverages Open Source Intelligence

Last week, we were thrilled to present a webinar featuring threat intelligence expert Stephen Coty. Stephen is the Chief Security Evangelist of Alert Logic, a well-known managed security service...

View Article

Image may be NSFW.
Clik here to view.

Buk SAMs and the Downing of MH17

Analysis Summary Recorded Future web intelligence highlights multiple June/July reports that Ukrainian separatists had acquired Buk anti-aircraft missiles. With hindsight, it’s surprising that these...

View Article
Browsing all 141 articles
Browse latest View live