Category: Recorded Future

H1 2021: Malware and Vulnerability Trends Report

This article has been indexed from Recorded Future This report examines trends in malware use, distribution, and development, and high-risk vulnerabilities disclosed by major hardware and software vendors between January 1 and June 30, 2021. The post H1 2021: Malware…

Cyber Citizenship Education is Essential

This article has been indexed from Recorded Future Lisa Guernsey and Peter W. Singer join the podcast to discuss a recent report about the challenges educators face when it comes to preparing students for the online world. The post Cyber…

The Business of Fraud: SIM Swapping

This article has been indexed from Recorded Future SIM swapping involves deceiving a mobile provider (usually through social engineering) into transferring a victim’s phone number to a SIM card controlled by a cybercriminal. The post The Business of Fraud: SIM…

Action is Critical in US Cyber Policy

This article has been indexed from Recorded Future Jamil Jaffer joins the podcast to discuss his career journey on Capitol Hill and his views on the Biden admin’s cyber defense policies. The post Action is Critical in US Cyber Policy…

Establishing Cyber Rules of the Road with Russia

This article has been indexed from Recorded Future How do the United States and Russia come to an agreement on cybersecurity relations? Lauren Zabierek joins the podcast to discuss. The post Establishing Cyber Rules of the Road with Russia appeared…

Understanding Ransomware

This article has been indexed from Recorded Future Rachel Lerman from the Washington Post joins the podcast to discuss the growing global problem of ransomware attacks. The post Understanding Ransomware appeared first on Recorded Future. Read the original article: Understanding…

Protect Against BlackMatter Ransomware Before It’s Offered

This article has been indexed from Recorded Future BlackMatter, a new ransomware-as-a-service affiliate program founded in July 2021, encrypts victim’s files and appears to have been developed by a relatively sophisticated group. The post Protect Against BlackMatter Ransomware Before It’s…

Protect Against BlackMatter Ransomware Before It’s Offered

This article has been indexed from Recorded Future BlackMatter, a new ransomware-as-a-service affiliate program founded in July 2021, encrypts victim’s files and appears to have been developed by a relatively sophisticated group. The post Protect Against BlackMatter Ransomware Before It’s…

China’s Ambitions Toward Digital Colonization

This article has been indexed from Recorded Future China provides attractive, cost-effective infrastructure deals to developing nations, but at what cost is this offer made? Charity Wright joins the podcast to discuss. The post China’s Ambitions Toward Digital Colonization appeared…

You’re Not Really Ready for Ransomware

This article has been indexed from Recorded Future Is your organization truly ready for a ransomware attack? Ryan Chapman, Principal Incident Response & Forensics Consultant at BlackBerry isn’t sure most organizations are prepared. The post You’re Not Really Ready for…

Cutting Through the Cybersecurity Noise and Chao

This article has been indexed from Recorded Future Ryan Naraine, creator and publisher of Security Conversations, joins the podcast to discuss how to bridge the gap between CISOs trying to keep their organizations safe and cutting through cybersecurity noise and…

The Four Building Blocks for Any Security Team

This article has been indexed from Recorded Future What does “back-to-basics” mean in terms of orienting a security team for operational efficiency? How do you define the basics of Security Operations? The post The Four Building Blocks for Any Security…

Threats to the 2020 Tokyo Olympic Games

This article has been indexed from Recorded Future The high profile and international nature of the Olympics makes it a target for those seeking to cause politically motivated harm, enrich themselves through criminality, or embarrass the host nation on the…

Rallying Security Intelligence With the Pride Community

This article has been indexed from Recorded Future Recorded Future’s Lea Cure and Evan Akin join the podcast to discuss the recently published report focused on the political landscape facing the LGBTQIA+ community worldwide in the last year. The post…

How “HackMachine” Enables Fraud and Cyber Intrusions

This article has been indexed from Recorded Future The cybercriminal software “HackMachine” provides attackers with a simple-to-use and automated method of gaining access to web applications. The post How “HackMachine” Enables Fraud and Cyber Intrusions appeared first on Recorded Future.…

A Pivotal Moment for Cyber Insurance

This article has been indexed from Recorded Future Michael Phillips of cyber insurance firm Resilience joins the podcast to discuss the challenges and opportunities for cyber insurance. The post A Pivotal Moment for Cyber Insurance appeared first on Recorded Future.…

Rage Against the HackMachine

This article has been indexed from Recorded Future There’s a versatile, easy-to-use utility being offered for sale on underground hacker forums, called HackMachine. It allows users to target victim domains and scan sites for known vulnerabilities, attempt brute force attacks,…

A Nuanced Approach to Insider Threats

This article has been indexed from Recorded Future Joining us this week is Jon Ford, Managing Director of Global Government Services & Insider Threat Risk Solutions at Mandiant. Our conversation centers on his experience with effective insider threat programs, from…

Thwarting Upstream Code Flaws From Reaching the Supply Chain

This article has been indexed from Recorded Future Lindsay Kaye, director of operational outcomes for Recorded Future’s Insikt Group joins the podcast to discuss protecting supply chains. The post Thwarting Upstream Code Flaws From Reaching the Supply Chain appeared first…

Thwarting Upstream Code Flaws From Reaching the Supply Chain

This article has been indexed from Recorded Future Lindsay Kaye, director of operational outcomes for Recorded Future’s Insikt Group joins the podcast to discuss protecting supply chains. The post Thwarting Upstream Code Flaws From Reaching the Supply Chain appeared first…

The DOD’s SWAT Team of Nerds

This article has been indexed from Recorded Future Jack Cable joins the podcast to discuss his past, his reputation as a hacker, and his experience helping run the Hack the Pentagon portfolio. The post The DOD’s SWAT Team of Nerds…

Unpacking the Emotet Takedown

This article has been indexed from Recorded Future In January of 2021 an international effort led by Europol took control of Emotet infrastructure, effectively taking it down. The post Unpacking the Emotet Takedown appeared first on Recorded Future. Read the…

Unpacking the Emotet Takedown

This article has been indexed from Recorded Future In January of 2021 an international effort led by Europol took control of Emotet infrastructure, effectively taking it down. The post Unpacking the Emotet Takedown appeared first on Recorded Future. Read the…

The Business of Fraud: Drops and Mules

This article has been indexed from Recorded Future Mules, individuals who transfer money or goods on the behalf of others, are a crucial component to the success of financial crimes. The post The Business of Fraud: Drops and Mules appeared…

The Business of Fraud: Drops and Mules

Mules, individuals who transfer money or goods on the behalf of others, are a crucial component to the success of financial crimes. The post The Business of Fraud: Drops and Mules appeared first on Recorded Future. Read the original article:…

Bringing Tools of National Power to Fight Ransomware

Philip Reiner, CEO at The Institute for Security and Technology joins the podcast to discuss a recent report published by the institute that discusses combating ransomware. The post Bringing Tools of National Power to Fight Ransomware appeared first on Recorded…

Navigating the Travel Industry with Threat Intelligence

Director of Cyber Treat Intelligence at Expedia Group, Collin Barry joins the podcast to talk about protecting online travel. The post Navigating the Travel Industry with Threat Intelligence appeared first on Recorded Future. Read the original article: Navigating the Travel…

Navigating the Travel Industry with Threat Intelligence

Read the original article: Navigating the Travel Industry with Threat Intelligence Director of Cyber Treat Intelligence at Expedia Group, Collin Barry joins the podcast to talk about protecting online travel. The post Navigating the Travel Industry with Threat Intelligence appeared…

Breached Online Ordering Platforms Expose Dozens of Restaurants

Read the original article: Breached Online Ordering Platforms Expose Dozens of Restaurants Cybercriminals have begun targeting restaurant service companies and in turn exposed over 300,000 payment cards from 70 restaurants. The post Breached Online Ordering Platforms Expose Dozens of Restaurants…

The Business of Fraud: Deepfakes, Fraud’s Next Frontier

Read the original article: The Business of Fraud: Deepfakes, Fraud’s Next Frontier Threat actors have begun to use dark web sources to offer customized services and tutorials that incorporate visual and audio deepfake technologies designed to bypass and defeat security…

Malware Party Tricks and Cybersecurity Trends

Read the original article: Malware Party Tricks and Cybersecurity Trends Hall of Famer Graham Cluley joins the podcast to swap old war stories about fighting malware back in the early internet days, how things have changed, and what the future…

Iran-Linked Threat Actor The MABNA Institute’s Operations in 2020

Read the original article: Iran-Linked Threat Actor The MABNA Institute’s Operations in 2020 The MABNA Institute, an Iranian group, continued its global operations against academic and research sector institutions throughout 2020. The post Iran-Linked Threat Actor The MABNA Institute’s Operations…

Protecting Journalists Online

Read the original article: Protecting Journalists Online Anjuli Shere joins the podcast to discuss the ongoing threats against journalists and organizations and how she is creating a framework to improve the protection of their staff against threats. The post Protecting…

Powering Enterprise Security with End-to-End Threat Visibility

Read the original article: Powering Enterprise Security with End-to-End Threat Visibility New capabilities for our Threat Intelligence and SecOps Intelligence solutions arm clients with real-time, high-confidence intelligence for faster identifications and triage of security concerns. The post Powering Enterprise Security…

The Inner Workings of Financially Motivated Cybercrime

Read the original article: The Inner Workings of Financially Motivated Cybercrime Roman Sannikov and Kirill Boychenko join the podcast to describe types of fraud methods and services currently used by threat actors. The post The Inner Workings of Financially Motivated…

Streamlining Third-Party Risk Management

Read the original article: Streamlining Third-Party Risk Management Madiha Fatima discusses how to create an effective due diligence process, integrating automation, and process efficiencies for third party risk management. The post Streamlining Third-Party Risk Management appeared first on Recorded Future.…

Streamlining Third Party Risk Management

Read the original article: Streamlining Third Party Risk Management Madiha Fatima discusses how to create an effective due diligence process, integrating automation, and process efficiencies for third party risk management. The post Streamlining Third Party Risk Management appeared first on…

The Business of Fraud: Fraud Tutorials and Courses

Read the original article: The Business of Fraud: Fraud Tutorials and Courses Training tutorials and courses sustain the activities of various underground forums and threat actors. See real examples of these courses. The post The Business of Fraud: Fraud Tutorials…

Ransomware and Extortion Evolve More Brazen Tactics

Read the original article: Ransomware and Extortion Evolve More Brazen Tactics Allan Liska comes on the podcast to update us on the latest trends he is tracking on the ransomware and online extortion fronts. The post Ransomware and Extortion Evolve…

An Internet Born In a Threat-Free Environment

Read the original article: An Internet Born In a Threat-Free Environment Paul Vixie, CEO and co-founder of Farsight Security, shares his insights on why he believes it’s best not to rely on outsourcing your DNS. The post An Internet Born…

The Journey Ahead is the Challenge in ICS

Read the original article: The Journey Ahead is the Challenge in ICS On the occasion of this, our 200th episode of the Recorded Future podcast, we welcome back our very first guest, Robert M. Lee, CEO of industrial control systems…

IBM Security and Recorded Future: Better Together

Read the original article: IBM Security and Recorded Future: Better Together Recorded Future delivers more context than threat feeds, updates in real time for relevant intelligence and integrates with IBM Security SOAR. The post IBM Security and Recorded Future: Better…

Using Intelligence to Prioritize AWS Guard Duty Alerts

Read the original article: Using Intelligence to Prioritize AWS Guard Duty Alerts Explore how Recorded Future Express paired with AWS GuardDuty can speed up your threat detection, investigation, and response to threats. The post Using Intelligence to Prioritize AWS Guard…

A Call to Arms In Favor of Rationality

Read the original article: A Call to Arms In Favor of Rationality Sir David Omand, former director of @GCHQ discusses his career in intelligence and public service, and the changes he’s seen along the way. The post A Call to…

Cyber Threats to the Black Community

Read the original article: Cyber Threats to the Black Community To honor Black History Month, Insikt Group conducted research into cyber threats that are facing the Black community within the United States. The post Cyber Threats to the Black Community…

Leaders Make Good News Out of Bad

Read the original article: Leaders Make Good News Out of Bad Two CEOs from leading companies in the cybersecurity industry join the podcast to share what it’s like as a CEO in a rapidly changing field. The post Leaders Make…

Announcing Security Intelligence for Splunk — For Free

Read the original article: Announcing Security Intelligence for Splunk — For Free Our free 30-day trial of our integration for Splunk Enterprise and ES — this offers Splunk users access to our real-time SecOps intelligence. The post Announcing Security Intelligence…

Deepfakes as a Service

Read the original article: Deepfakes as a Service Andrei Barysevich, co-founder and CEO of fraud intelligence firm Gemini Advisory, shares how organizations can best defend against deepfakes. The post Deepfakes as a Service appeared first on Recorded Future.   Become…

Unraveling Disinformation in Social Media

Read the original article: Unraveling Disinformation in Social Media Jane Lytvynenko, senior reporter at Buzzfeed News, comes on the podcast to share her insights on misinformation and disinformation. The post Unraveling Disinformation in Social Media appeared first on Recorded Future.…

Security Intelligence Handbook Chapter 8: Demystifying Risk Analysis

Read the original article: Security Intelligence Handbook Chapter 8: Demystifying Risk Analysis Explore how specific loss probabilities empower organizations to strike the right balance between protecting and running the business. The post Security Intelligence Handbook Chapter 8: Demystifying Risk Analysis…