Monitoring Arms Control Compliance With Web Intelligence
Can we find insights for defense against chemical and biological weapon threats by analyzing livestock disease outbreaks and public health crises? Research by Maynard Holliday of Sandia National Labs...
View ArticleAssessing MH17-Themed Cyber Threats
In our webinar today we assessed the aftermath of the MH17 tragedy from a threat intelligence perspective. Together with our guest Rich Barger, Chief Intelligence Officer of Cyber Squared Inc., we...
View ArticleHow Al-Qaeda Uses Encryption Post-Snowden (Part 2) – New Analysis in...
Analysis Summary Al-Qaeda (AQ) encryption product releases have continued since our May 8, 2014 post on the subject, strengthening earlier hypothesis about Snowden leaks influencing AQ crypto product...
View ArticleAl-Qaeda and Snowden: Correlation, Causation, and Temporal Analysis
Our recent research on Al-Qaeda encryption again generated a tremendous amount of interest which we were thrilled to see, with stories in NPR, Wall Street Journal, Ars Technica, ABC News, Washington...
View ArticleThe Power of the Web: Anticipating Cyber Attacks
IT security teams are under siege, constantly defending against data breaches, IP theft, cyber crime, and other threats in a long and costly war. Interpol estimates cyber crime costs people and...
View ArticleIntegrating Recorded Future With Maltego
The after-action report from Black Hat 2014… Paterva’s Maltego product is a great “Swiss army knife” for researching IT infrastructure – whether the context is performing recon for pen-testing, reverse...
View ArticlePutting Data in Perspective With Web Intelligence
Summary Government and private sector threat intelligence analysts are awash in data: both proprietary and open source. The evaluation of both – all-source analysis – provides analysts the perspective...
View ArticleHow Asprox Malware Became an APT in 4 Phases
Analysis Summary Asprox has four distinct development phases, most recently taking on APT-style obfuscation techniques. Asprox diversified its TTPS, utilizing new languages and attachment filenames...
View ArticleISIS Jumping from Account to Account, Twitter Trying to Keep Up
The following analysis was done in collaboration with Sky News. Analysis Summary ISIS supporters will create a new account, usually under a very similar name, almost immediately after their profile is...
View ArticleHow to Use the Information-Seeking Mantra in Cyber Intelligence Dashboards
This is the second post in our blog series, “Visualizing Cyber Intelligence.” In the previous post, we got a glimpse of two important contributions of Edward Tufte to the field of data visualization:...
View ArticleHow Pace University is Building the Next Generation of Cyber Security Analysts
Editor’s Note Cyber threat intelligence is a young area of security. Relatively few universities offer formalized instruction to prepare analysts for this specific problem set, and these curriculums...
View ArticleBashed and Shellshocked: Early Reports of Exploitation in the Wild
Lots of IT security teams are at work right now to patch the Shellshock vulnerability (CVE-2014-6271) ASAP – while keeping an eye on their threat intelligence sources for exploitation in the wild. And...
View ArticleRapidly Discover IOCs With Maltego and Recorded Future
Discovering and validating known indicators of compromise (IOCs) can be a daunting task for any cyber security operation. This is especially true if you do not have the luxury to pay for all of the...
View ArticleShellshock and Xen Remediation
This blog post summarizes our remediation of two high-profile software vulnerabilities. Shellshock CVE-2014-6271 Remediation On September 24, 2014, a security vulnerability dubbed Shellshock...
View ArticleWhy CISOs Are Investing in Cyber Threat Intelligence
Recently, we had the wonderful opportunity to host a webinar featuring Threat Intelligence Expert and Principal Analyst, Rick Holland of Forrester Research, Inc. Rick discussed why a chief information...
View ArticleDiscovering Sandworm IOCs With Recorded Future Maltego Transforms
Yesterday, iSIGHT Partners published a blog post announcing the discovery of CVE-2014-4114, a zero-day vulnerability used in a Russian cyber-espionage campaign. The campaign was dubbed Sandworm and...
View Article221 of the Fortune 500 Have Exposed Credentials on the Web
Recorded Future analysis published in the “The Fortune 500’s Unfortunate 221″ threat intelligence report identified employee credential exposures for at least 44% of major US companies in 2014. These...
View ArticleExposed Corporate Credentials on the Open Web, a Real Security Risk
Last Friday, a New York Times article described how the recent online attack against JPMorgan was possibly connected to a data breach on a third-party website. The target mentioned in the article is...
View Article3 Important Trends for ICS/SCADA Systems
Last week, we presented a webinar with the ICS/SCADA experts from Cimation. Industrial control systems (ICS) are the “nervous systems” that manage facilities and operations, everything from robotic...
View ArticleRecorded Future Transforms for Maltego Now Available
We’re delighted to announce the release of Recorded Future transforms for Maltego! Why You Care These transforms make it simple and fast to fuse our information into Maltego investigations. If you’ve...
View Article