Read the original article: White House Experience Informs Venture Capital Nick Sinai, senior advisor at Insight Partners, discusses his past experience in the White House as the U.S. Deputy Chief Technology Officer. The post White House Experience Informs Venture Capital…
Tag: Recorded Future
Keyloggers and Stealers Help Harvest Lifeblood Data of Criminal Activities
Read the original article: Keyloggers and Stealers Help Harvest Lifeblood Data of Criminal Activities Keyloggers and stealers allow threat actors to gather sensitive information from victim systems, including credentials, login data, and more. The post Keyloggers and Stealers Help Harvest…
Security Intelligence Handbook Chapter 7: Understand Your Adversaries
Read the original article: Security Intelligence Handbook Chapter 7: Understand Your Adversaries Risk modeling offers a way to objectively assess current risks and estimate quantifiable financial returns from investments in cybersecurity. The post Security Intelligence Handbook Chapter 7: Understand Your…
Correlating the COVID-19 Opportunist Money Trail
Read the original article: Correlating the COVID-19 Opportunist Money Trail Insikt Group’s Lindsay Kaye and Charity Wright join the podcast to discuss their findings regarding the COVID-19 opportunist money trail. The post Correlating the COVID-19 Opportunist Money Trail appeared first…
Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic
Read the original article: Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic Insikt Group analyzes criminal, extremist, and state-sponsored threat actors that have capitalized on the pandemic’s global economic crisis. The post Follow the Money: Qualifying Opportunism…
Examining the Opportunism Behind Cyberattacks During the COVID-19 Pandemic
Read the original article: Examining the Opportunism Behind Cyberattacks During the COVID-19 Pandemic Insikt Group analyzes criminal, extremist, and state-sponsored threat actors that have capitalized on the pandemic’s global economic crisis. The post Examining the Opportunism Behind Cyberattacks During the…
You Need More Than Brand Monitoring To Protect Your Brand
Read the original article: You Need More Than Brand Monitoring To Protect Your Brand By surfacing relevant and actionable intelligence, brand intelligence enables you to defend your organization from common brand attacks. The post You Need More Than Brand Monitoring…
Technology and Human Stories Intersect at the International Spy Museum
Read the original article: Technology and Human Stories Intersect at the International Spy Museum Andrew Hammond, historian and curator of the International Spy Museum, shares his perspective on the importance of physical artifacts. The post Technology and Human Stories Intersect…
Unemployment Fraud in the Criminal Underground
Read the original article: Unemployment Fraud in the Criminal Underground Cybercriminals have demonstrated a preference to advertise unemployment fraud tutorials via messaging platforms over criminal forums. The post Unemployment Fraud in the Criminal Underground appeared first on Recorded Future. …
Bulletproof Hosting Services Essential for Criminal Underground Security and Anonymity
Read the original article: Bulletproof Hosting Services Essential for Criminal Underground Security and Anonymity Bulletproof hosting services have increasingly appealed to ransomware operators attempting to avoid the attention of law enforcement. The post Bulletproof Hosting Services Essential for Criminal Underground…
SolarWinds: The CSO Perspective
Read the original article: SolarWinds: The CSO Perspective Gavin Reid, chief security officer at Recorded Future, shares his thoughts on the evolving SolarWinds breach and actions he’s taken as CSO. The post SolarWinds: The CSO Perspective appeared first on Recorded…
SolarWinds Orion Breach – What It Means for the Industry Writ Large
Read the original article: SolarWinds Orion Breach – What It Means for the Industry Writ Large Jonathan Condra, senior manager for strategic and persistent threats with Insikt Group, gives his perspective on the recent SolarWinds breach. The post SolarWinds Orion…
Adversary Infrastructure Report 2020: A Defender’s View
Read the original article: Adversary Infrastructure Report 2020: A Defender’s View Insikt Group tracks the creation of new infrastructure for post-exploitation toolkits, custom malware frameworks, and remote access trojans. The post Adversary Infrastructure Report 2020: A Defender’s View appeared first…
Security Intelligence Handbook Chapter 6: How to Prioritize Patching with Vulnerability Intelligence
Read the original article: Security Intelligence Handbook Chapter 6: How to Prioritize Patching with Vulnerability Intelligence Explore how vulnerability intelligence zeros in on attacker behaviors and how a risk-based approach simplifies operational efficiency. The post Security Intelligence Handbook Chapter 6:…
AI Enables Predictability and Better Business
Read the original article: AI Enables Predictability and Better Business Vice president of product for IBM Security Aarti Borkar joins the podcast this week to discuss her views on artificial intelligence. The post AI Enables Predictability and Better Business appeared…
SolarWinds Attribution: Are We Getting Ahead of Ourselves?
Read the original article: SolarWinds Attribution: Are We Getting Ahead of Ourselves? SolarWinds breach attribution — are we getting ahead of ourselves by assuming it’s Russia? John Wetzel takes a contrarian view in this blog. The post SolarWinds Attribution: Are…
AI Enables Predictability and Better Business
Read the original article: AI Enables Predictability and Better Business Vice president of product for IBM Security Aarti Borkar joins the podcast this week to discuss her views on artificial intelligence. The post AI Enables Predictability and Better Business appeared…
SolarWinds: What the Intelligence Tells Us
Read the original article: SolarWinds: What the Intelligence Tells Us Recorded Future’s David SooHoo provides a brief recap of the first five days following disclosure of the SolarWinds attack incident. The post SolarWinds: What the Intelligence Tells Us appeared first…
Forums, Marketplaces, and Shops Remain Essential Venues for the Criminal Economy
Read the original article: Forums, Marketplaces, and Shops Remain Essential Venues for the Criminal Economy Insikt Group’s analysis details the differences and similarities among the three primary dark web resources: forums, shops, and marketplaces. The post Forums, Marketplaces, and Shops…
Security Intelligence Handbook Chapter 5: How Security Intelligence Drives Proactive Response
Read the original article: Security Intelligence Handbook Chapter 5: How Security Intelligence Drives Proactive Response Fusing internal and external threat, security, and business insights gives incident response teams advanced warning and actionable facts. The post Security Intelligence Handbook Chapter 5:…
Threat Hunting Offsets the Technology Gaps
Read the original article: Threat Hunting Offsets the Technology Gaps EVP and head of Security Operations at Nuspire John Ayers discusses how organizations can best approach implementing threat hunting. The post Threat Hunting Offsets the Technology Gaps appeared first on…
What Geopolitical Intelligence Means
Read the original article: What Geopolitical Intelligence Means Geopolitical intelligence efficiently captures data and “chatter” from a variety of sources and filters it to deliver precision intelligence. The post What Geopolitical Intelligence Means appeared first on Recorded Future. Become…
How to Apply Elite Intelligence to Microsoft Azure Sentinel
Read the original article: How to Apply Elite Intelligence to Microsoft Azure Sentinel See how our integrations with Microsoft Azure empower organizations to reduce risk and scale their cloud innovations securely. The post How to Apply Elite Intelligence to Microsoft…
cPanel and WHM Vulnerability Easy to Exploit With Dark Web Credentials
Read the original article: cPanel and WHM Vulnerability Easy to Exploit With Dark Web Credentials Web hosting platforms are prime targets for cybercriminals, giving them access to hundreds of websites and the data ingested by their users. The post cPanel…
Visionaries, Builders, and Operators
Read the original article: Visionaries, Builders, and Operators Jeff Fagnan, founder and managing director at Accomplice, shares why cybersecurity should be a foundational element of every modern company. The post Visionaries, Builders, and Operators appeared first on Recorded Future. …
Exploit Kits, Though in Decline, Remain Powerful Tool for Delivering Malware
Read the original article: Exploit Kits, Though in Decline, Remain Powerful Tool for Delivering Malware Over the last two years, operators of exploit kits have modified their kits to include first-stage malware being used to deploy ransomware. The post Exploit…
Security Intelligence Handbook Chapter 4: How Security Intelligence Provides Critical Context for Triage
Read the original article: Security Intelligence Handbook Chapter 4: How Security Intelligence Provides Critical Context for Triage With security intelligence, teams are empowered to discover threats and triage alerts directly within existing SIEM and SOAR technology. The post Security Intelligence…
What Is Third-Party Intelligence?
Read the original article: What Is Third-Party Intelligence? Third-party intelligence is precision security intelligence that reduces risk by providing insights about the vendors and partner companies. The post What Is Third-Party Intelligence? appeared first on Recorded Future. Become a…
An Ability to Execute and a Fantastic Amount of Luck
Read the original article: An Ability to Execute and a Fantastic Amount of Luck Andy Ellis, chief security officer of Akamai Technologies, discusses the importance of a company culture and his take on threat intelligence. The post An Ability to…
Tibet and Taiwan Targeted in Spearphishing Campaigns Using MESSAGEMANIFOLD Malware
Read the original article: Tibet and Taiwan Targeted in Spearphishing Campaigns Using MESSAGEMANIFOLD Malware Insikt Group discovered links to an unknown threat activity group previously engaged in activity targeting Taiwanese legislators in May 2020. The post Tibet and Taiwan Targeted…
Egregor Ransomware, Used in a String of High-Profile Attacks, Shows Connections to QakBot
Read the original article: Egregor Ransomware, Used in a String of High-Profile Attacks, Shows Connections to QakBot Insikt Group analyzes that the Egregor ransomware is a complex piece of malware, employing obfuscation and anti-analysis techniques. The post Egregor Ransomware, Used…
Build Better Phishing Playbooks with ServiceNow and Recorded Future
Read the original article: Build Better Phishing Playbooks with ServiceNow and Recorded Future At our Predict 2020 conference, ServiceNow’s Mike Plavin showcased the comprehensive Recorded Future ServiceNow integration portfolio. The post Build Better Phishing Playbooks with ServiceNow and Recorded Future…
What Vulnerability Intelligence Means for Your Organization
Read the original article: What Vulnerability Intelligence Means for Your Organization Vulnerability intelligence empowers you to defend your organization by prioritizing vulnerabilities that represent real risk to the business. The post What Vulnerability Intelligence Means for Your Organization appeared first…
Countering 5G Conspiracy Theories
Read the original article: Countering 5G Conspiracy Theories Dave Brown, cyber intelligence professional at BT, shares his insight on the physical availability of 5G for consumers and the public sector. The post Countering 5G Conspiracy Theories appeared first on Recorded…
Automate Security Response With Cortex XSOAR and Recorded Future
Read the original article: Automate Security Response With Cortex XSOAR and Recorded Future At Predict 2020, Prasen Shelar, senior product manager at Palo Alto Networks, showcased the combination of Recorded Future and Cortex XSOAR. The post Automate Security Response With…
‘Tis the Season for Cybercriminals: Retail’s Top Cyber Threats
Read the original article: ‘Tis the Season for Cybercriminals: Retail’s Top Cyber Threats The top threats to retail and e-commerce this holiday season include web application compromise, cloud storage compromise, and more. The post ‘Tis the Season for Cybercriminals: Retail’s…
Security Intelligence Handbook Chapter 3: The Security Intelligence Lifecycle
Read the original article: Security Intelligence Handbook Chapter 3: The Security Intelligence Lifecycle Security intelligence aligns with the tried-and-true “intelligence cycle,” which has guided government and military teams for decades. The post Security Intelligence Handbook Chapter 3: The Security Intelligence…
Cyber is as Much Psychology as it is Technology
Read the original article: Cyber is as Much Psychology as it is Technology Pierre Noel, managing director at ISTARI, joins the podcast to share how culture impacts security and the importance of threat intelligence. The post Cyber is as Much…
How to Apply Elite Intelligence to AWS Security Services
Read the original article: How to Apply Elite Intelligence to AWS Security Services At Predict 2020, Amazon Web Services’ Trish Cagliostro demonstrated how to apply security intelligence to AWS security services. The post How to Apply Elite Intelligence to AWS…
Mass Migration of Users to Parler Prompts Concerns Over Security and Disinformation
Read the original article: Mass Migration of Users to Parler Prompts Concerns Over Security and Disinformation With a small team of employees and lack of infrastructure to support the influx of users, Parler may be facing some major security concerns.…
How The Stadtwerke Klagenfurt Group Reduces Risk to Critical Infrastructure
Read the original article: How The Stadtwerke Klagenfurt Group Reduces Risk to Critical Infrastructure Discover how our security intelligence empowers the Stadtwerke Klagenfurt Group’s CISO Rene Schmid and his team to speed IOC investigation. The post How The Stadtwerke Klagenfurt…
Inside the World of Cyber Venture Capital
Read the original article: Inside the World of Cyber Venture Capital Listen to Mark Goodman, managing director at MassMutual Ventures, discuss if he thinks cyber continues to be a hot area for investment. The post Inside the World of Cyber…
Security Intelligence Handbook Chapter 2: Examining Operational and Strategic Security Intelligence
Read the original article: Security Intelligence Handbook Chapter 2: Examining Operational and Strategic Security Intelligence When the right intelligence is delivered at the right time, teams are empowered to disrupt adversaries and protect the organization. The post Security Intelligence Handbook…
The Third-Party Ransomware Attack You Never Saw Coming
Read the original article: The Third-Party Ransomware Attack You Never Saw Coming Our third-party intelligence allows you to monitor ransomware extortion sites for mentions of your vendors, suppliers, and partners. The post The Third-Party Ransomware Attack You Never Saw Coming…
How to Triage Splunk Alerts Faster
Read the original article: How to Triage Splunk Alerts Faster Recorded Future’s elite intelligence in Splunk enables security teams to move quickly and spend their time on the incidents that matter most. The post How to Triage Splunk Alerts Faster…
New APT32 Malware Campaign Targets Cambodian Government
Read the original article: New APT32 Malware Campaign Targets Cambodian Government Recorded Future’s Insikt Group has discovered a new malware campaign targeting the Cambodian government using an ASEAN-themed spearphish. The post New APT32 Malware Campaign Targets Cambodian Government appeared first…
Trickbot is Down But Not Out
Read the original article: Trickbot is Down But Not Out Recorded Future’s senior intelligence analyst Greg Lesnewich joins the podcast this week discuss the latest on the Trickbot global botnet. The post Trickbot is Down But Not Out appeared first…
Q3 Malware Trends: Ransomware Extorts Education, Emotet and Crypto Mining Malware Evolve, and Android Malware Persists
Read the original article: Q3 Malware Trends: Ransomware Extorts Education, Emotet and Crypto Mining Malware Evolve, and Android Malware Persists In the third quarter of 2020, Insikt Group observed major expansions in the tactics, techniques, and procedures of ransomware operators.…
Ransomware-as-a-Service Becomes Increasingly Accessible via Social Media and Open Sources
Read the original article: Ransomware-as-a-Service Becomes Increasingly Accessible via Social Media and Open Sources Recorded Future’s Insikt Group analyzes how ransomware-as-a-service becomes increasingly accessible via social media and open sources. The post Ransomware-as-a-Service Becomes Increasingly Accessible via Social Media and…
Q3 2020 Vulnerability Landscape
Read the original article: Q3 2020 Vulnerability Landscape Based on analysis of vulnerabilities disclosed in Q3 of 2020, Insikt Group identified 22 as the most high-risk vulnerabilities of the quarter. The post Q3 2020 Vulnerability Landscape appeared first on Recorded…
Give Analysts Exactly What They Want
Read the original article: Give Analysts Exactly What They Want Paul Battista, CEO of Polarity, comes on the podcast to share how being stuck inside during a blizzard led to his creating a popular app. The post Give Analysts Exactly…
Security Intelligence Handbook Chapter 1: Why Security Intelligence Matters
Read the original article: Security Intelligence Handbook Chapter 1: Why Security Intelligence Matters The first chapter of our handbook is one of many that demonstrates how to disrupt adversaries and measurably reduce risk with intelligence. The post Security Intelligence Handbook…
How Unprecedented Intelligence Drives Stockholm Public Transportation’s Need for Speed
Read the original article: How Unprecedented Intelligence Drives Stockholm Public Transportation’s Need for Speed Learn more about Stockholm Public Transportation’s intelligence journey with Recorded Future, which also includes third-party intelligence. The post How Unprecedented Intelligence Drives Stockholm Public Transportation’s Need…
Insikt Group Discovers Global Credential Harvesting Campaign Using FiercePhish Open Source Framework
Read the original article: Insikt Group Discovers Global Credential Harvesting Campaign Using FiercePhish Open Source Framework Recorded Future’s Insikt Group analyzes a phishing campaign utilizing the FiercePhish open source offensive phishing framework. The post Insikt Group Discovers Global Credential Harvesting…
Too Sleepy to be Secure?
Read the original article: Too Sleepy to be Secure? Lincoln Keffengerger, threat intelligence lead at Deloitte Global shares his research into the role sleep has in keeping organizations safe. The post Too Sleepy to be Secure? appeared first on Recorded…
Security Intelligence Handbook Introduction: A Complete Picture of Security Intelligence
Read the original article: Security Intelligence Handbook Introduction: A Complete Picture of Security Intelligence In our new handbook, learn why cybersecurity experts shifted away from the concept of threat intelligence, embracing security intelligence. The post Security Intelligence Handbook Introduction: A…
What Threat Intelligence Really Means
Read the original article: What Threat Intelligence Really Means Threat intelligence from Recorded Future is enriched by world-class analysts and can be integrated directly into your current workflows. The post What Threat Intelligence Really Means appeared first on Recorded Future.…
The TIP Is Dead, Long Live the TIP
Read the original article: The TIP Is Dead, Long Live the TIP TIPs provide insightful metrics and save an organization money by optimizing intelligence, content development, and investigation operations. The post The TIP Is Dead, Long Live the TIP appeared…
The FBI Builds Enduring Partnerships in Cyber
Read the original article: The FBI Builds Enduring Partnerships in Cyber FBI cyber division section chief Herb Stapleton discusses his journey toward a mission-based career in public service on the podcast. The post The FBI Builds Enduring Partnerships in Cyber…
Banking Web Injects Are Top Cyber Threat for Financial Sector
Read the original article: Banking Web Injects Are Top Cyber Threat for Financial Sector Insikt Group assesses that the source code of Cerberus Android bot will allow cybercriminals to target banks and financial organizations. The post Banking Web Injects Are…
Get Your Handbook for Disrupting Adversaries and Reducing Risk
Read the original article: Get Your Handbook for Disrupting Adversaries and Reducing Risk Our refreshed security intelligence handbook offers practical information and advice on disrupting the adversaries your organization faces. The post Get Your Handbook for Disrupting Adversaries and Reducing…
How ManoMano Defends Against Underground Data Marketplaces With Elite Security Intelligence
Read the original article: How ManoMano Defends Against Underground Data Marketplaces With Elite Security Intelligence In this case study, learn how our security intelligence empowers ManoMano to identify and anticipate the next cyber threat to their business. The post How…
The Fascinating Paradox of Cryptocurrency
Read the original article: The Fascinating Paradox of Cryptocurrency Joining the podcast is Kim Grauer, head of research at Chainalysis, to express her views on cryptocurrency and the impact on monetary policy. The post The Fascinating Paradox of Cryptocurrency appeared…
How Predict 2020 Disrupted the Status Quo
Read the original article: How Predict 2020 Disrupted the Status Quo Access all of the on-demand video sessions from our Predict 2020 conference on the Recorded Future Predict 2020 video channel now! The post How Predict 2020 Disrupted the Status…
What Is SecOps Intelligence?
Read the original article: What Is SecOps Intelligence? SecOps intelligence enables you to discover previously unidentified threats and triage internal alerts in your existing SIEM and SOAR systems. The post What Is SecOps Intelligence? appeared first on Recorded Future. …
What Brand Intelligence Means for Your Organization
Read the original article: What Brand Intelligence Means for Your Organization Brand intelligence is precision security intelligence that makes it easy to take down typosquat domains and find leaked credentials and more. The post What Brand Intelligence Means for Your…
Examining Russian Threats to the 2020 Election
Read the original article: Examining Russian Threats to the 2020 Election Roman Sannikov, director of cybercrime and underground intelligence at Recorded Future discusses the Russian threats to the 2020 US Election. The post Examining Russian Threats to the 2020 Election…
What to Expect at Predict 2020
Read the original article: What to Expect at Predict 2020 Join us at Predict to find out how security intelligence is being used to defend organizations and infrastructures against threat actors. The post What to Expect at Predict 2020 appeared…
How Security Intelligence Protects Sensitive Retail Data
Read the original article: How Security Intelligence Protects Sensitive Retail Data Applying security intelligence is key as retailers leverage digital transformation to communicate with customers and respond to their needs. The post How Security Intelligence Protects Sensitive Retail Data appeared…
Delivering Maximum Impact in the Public Sector
Read the original article: Delivering Maximum Impact in the Public Sector Michael Anderson, chief information security officer for Dallas County, discusses his career, including 10 years in the Intelligence Corp. The post Delivering Maximum Impact in the Public Sector appeared…
Defend Your Physical Assets With Geopolitical Intelligence
Read the original article: Defend Your Physical Assets With Geopolitical Intelligence Our Geopolitical Intelligence Module accelerates critical decision-making with contextual OSINT data on geopolitical threats and trends. The post Defend Your Physical Assets With Geopolitical Intelligence appeared first on Recorded…
4 Things Nobody Tells You About Security Intelligence
Read the original article: 4 Things Nobody Tells You About Security Intelligence To help shed some light, leaders from Recorded Future identified some of the things people don’t realize about security intelligence. The post 4 Things Nobody Tells You About…
Proactively Reduce Risk With Third-Party Intelligence
Read the original article: Proactively Reduce Risk With Third-Party Intelligence Our third-party intelligence gives continuous visibility on your entire supply chain by automatically alerting you to new cyber risk events. The post Proactively Reduce Risk With Third-Party Intelligence appeared first…
Curating Your Personal Security Intelligence Feed
Read the original article: Curating Your Personal Security Intelligence Feed Sal Aurigema, associate professor at the University of Tulsa, discusses the importance of curating a personal security intelligence feed. The post Curating Your Personal Security Intelligence Feed appeared first on…
How to Patch the Vulnerabilities That Really Matter to Your Organization
Read the original article: How to Patch the Vulnerabilities That Really Matter to Your Organization Vulnerability intelligence empowers you to stay a step ahead of your adversaries with risk scoring that surfaces dangerous vulnerabilities. The post How to Patch the…
5 Questions to Ask Yourself About Your Third-Party Risk
Read the original article: 5 Questions to Ask Yourself About Your Third-Party Risk Positioning security intelligence at the core of a third-party risk strategy enables you to track dynamic changes to vendors’ risk profiles. The post 5 Questions to Ask…
Elite Threat Intelligence That Disrupts Adversaries
Read the original article: Elite Threat Intelligence That Disrupts Adversaries Recorded Future eliminates manual research and surfaces intelligence in real time, providing a comprehensive view of their threat landscape. The post Elite Threat Intelligence That Disrupts Adversaries appeared first on…
Back Despite Disruption: RedDelta Resumes Operations
Read the original article: Back Despite Disruption: RedDelta Resumes Operations Insikt Group provides updates on tracking the activity of the suspected Chinese state-sponsored threat activity group RedDelta. The post Back Despite Disruption: RedDelta Resumes Operations appeared first on Recorded Future.…
Passion, Curiosity, and a Dash of Mischief
Read the original article: Passion, Curiosity, and a Dash of Mischief Kevin Magee, chief security officer at Microsoft Canada, shares his story of entrepreneurship, curiosity, and a lifelong passion for learning. The post Passion, Curiosity, and a Dash of Mischief…
Optimize Your Security Tech Stack With SecOps Intelligence
Read the original article: Optimize Your Security Tech Stack With SecOps Intelligence Our SecOps Intelligence Module enables security operations and incident response analysts to identify unknown threats and respond confidently. The post Optimize Your Security Tech Stack With SecOps Intelligence…
The Ultimate Kit for Every Step in Your Security Intelligence Journey
Read the original article: The Ultimate Kit for Every Step in Your Security Intelligence Journey The Ultimate Security Intelligence Kit acts as a one-stop resource for exploring the benefits of transforming your security program. The post The Ultimate Kit for…
Why Brand Intelligence Is Critical to Your Reputation
Read the original article: Why Brand Intelligence Is Critical to Your Reputation By collecting intelligence across open, closed, and technical sources, our brand intelligence module delivers context to defend your brand. The post Why Brand Intelligence Is Critical to Your…
The Highest Security Intelligence in the Shortest Time
Read the original article: The Highest Security Intelligence in the Shortest Time Craig Adams, chief product officer at Recorded Future, discusses how organizations should optimize investments through security intelligence. The post The Highest Security Intelligence in the Shortest Time appeared…
Elite Intelligence for Driving Business Outcomes
Read the original article: Elite Intelligence for Driving Business Outcomes The business value of security intelligence is demonstrated in its ability to align data with operational outputs that are relevant to an organization. The post Elite Intelligence for Driving Business…
Russian-Related Threats to the 2020 US Presidential Election
Read the original article: Russian-Related Threats to the 2020 US Presidential Election Insikt Group provides an overview of Russia-nexus cyberespionage and influence operations activity related to the 2020 U.S. elections. The post Russian-Related Threats to the 2020 US Presidential Election…
Creating Your Team of Security Intelligence Champions
Read the original article: Creating Your Team of Security Intelligence Champions When people and machines are paired, each works smarter, saving time and money, reducing human burnout, and improving security overall. The post Creating Your Team of Security Intelligence Champions…
Elite Security Intelligence That Moves at the Speed of Business
Read the original article: Elite Security Intelligence That Moves at the Speed of Business Recorded Future just introduced our six modules, each tailored to specific use cases to provide actionable security intelligence to streamline workflows. The post Elite Security Intelligence…
The Diversity of Security Challenges in Higher Education
Read the original article: The Diversity of Security Challenges in Higher Education Bob Turner, chief information security officer at the University of Wisconsin, Madison, discusses some of the challenges he faces in his profession. The post The Diversity of Security…
Credit Card ‘Sniffers’ Pose Persistent Threat to Growing E-Commerce Industry
Read the original article: Credit Card ‘Sniffers’ Pose Persistent Threat to Growing E-Commerce Industry Insikt Group discovers that sniffer variants contain many capabilities, including easy-to-use interfaces and the ability to organize compromised data. The post Credit Card ‘Sniffers’ Pose Persistent…
Behind the Scenes of a Brand Protection Takedown
Read the original article: Behind the Scenes of a Brand Protection Takedown Recorded Future’s chief marketing officer Tom Wentworth explores just how important the impact of security intelligence is on a company’s brand. The post Behind the Scenes of a…
Dos and Don’ts for Charting Your Security Intelligence Journey
Read the original article: Dos and Don’ts for Charting Your Security Intelligence Journey The right intelligence empowers security teams to make better, faster decisions, from security operations, to vulnerability management and beyond. The post Dos and Don’ts for Charting Your…
Launching the Cyber Intelligence News Site The Record
Read the original article: Launching the Cyber Intelligence News Site The Record Adam Janofsky discusses the launch of The Record by Recorded Future, which will aim to fill the gap between fast-breaking headlines and long-lead research. The post Launching the…
Analyzing the Threat of Ransomware Attacks Against US Elections
Read the original article: Analyzing the Threat of Ransomware Attacks Against US Elections This report looks at the threat of a ransomware attack against elections in the US, which has been a growing concern in the government and private sector.…
Server Security Postures Get a Boost From 6 Security Intelligence Solutions
Read the original article: Server Security Postures Get a Boost From 6 Security Intelligence Solutions By implementing security intelligence across your entire organization, your server security team can enable the company to defend its competitive advantage. The post Server Security…
COVID-19 Pandemic Persists While Extortion Ransomware Operators Run Rampant
Read the original article: COVID-19 Pandemic Persists While Extortion Ransomware Operators Run Rampant Insikt Group analyzes how threat actors have propagated forms of malware by employing references to the COVID-19 pandemic in various attack vectors. The post COVID-19 Pandemic Persists…
The Transformation of Managed Security Services
Read the original article: The Transformation of Managed Security Services Jim Aull, solutions architect at Verizon, shares insight into common misperceptions he finds companies may have when starting out on their security journey. The post The Transformation of Managed Security…
Insider Secrets From a Front-Line Industrial CISO
Read the original article: Insider Secrets From a Front-Line Industrial CISO While OT and IT leaders across the business are collaboratively addressing evolving challenges and threats, CISOs are uniquely positioned to lead. The post Insider Secrets From a Front-Line Industrial…
Elite Intelligence Ascends to the Cloud With Recorded Future and Microsoft Azure
Read the original article: Elite Intelligence Ascends to the Cloud With Recorded Future and Microsoft Azure Recorded Future’s partnership with Microsoft Azure brings intelligence to the cloud and empowers security teams with context to defend their organizations. The post Elite…
Defending MacOS Against Sophisticated Attacks
Read the original article: Defending MacOS Against Sophisticated Attacks Phil Stokes, security researcher at SentinelOne, joins the podcast to share his insights on the state of security on Apple’s desktop operating system. The post Defending MacOS Against Sophisticated Attacks appeared…
The Ultimate Kit for Adding Value to Your Cybersecurity Strategy
Read the original article: The Ultimate Kit for Adding Value to Your Cybersecurity Strategy Security intelligence from Recorded Future enables you to unlock business value, triple end-user productivity, and achieve full ROI in just four months. The post The Ultimate…