Recorded Future Blog

Intelligence analysis, industry perspective, product updates,
company news, and more.

The grugq Illuminates Influence Operations

March 25, 2019 • Zane Pokorny

To celebrate one hundred episodes of our podcast, the grugq joins us to discuss the history of influence operations, why they work, and what may be to come.

How Threat Intelligence Helps Determine File Reputation

March 22, 2019 • Zane Pokorny

We look at some of the ways to determine whether a file is legitimate and explain how these methods can be augmented by real-time threat intelligence.

Use Threat Intelligence to Reduce Third-Party Risk, Says Analytics Expert Thomas H. Davenport

March 21, 2019 • Zane Pokorny

A new report by Thomas H. Davenport breaks down cyber risk scores and the philosophy behind Recorded Future’s third-party risk management solution.

3 Ways Threat Intelligence Strengthens the American Intelligence Community

March 20, 2019 • Zane Pokorny

We survey the National Intelligence Strategy, a framework for intelligence operations, and explain how cyber threat intelligence supports its objectives.

LockerGoga Ransomware Disrupts Operations at Norwegian Aluminum Company

• Allan Liska

Norwegian aluminum company Norsk Hydro was recently targeted by LockerGoga, a relatively new strain of ransomware first discovered in January 2019.

Microsoft Targeted by 8 of 10 Top Vulnerabilities in 2018

March 19, 2019 • Kathleen Kuczma

In this report, we analyze thousands of sources, including code repositories and dark web sites, to share insight into the top 10 vulnerabilities from 2018.

Chinese Charm Attempts to Alter American Political Opinion

March 18, 2019 • Zane Pokorny

Priscilla Moriuchi discusses Insikt Group's recently published findings from their research into Chinese efforts to sway public opinion via social media.

Is That Vulnerability Critical? Judging the Severity of Threats With Threat Intelligence

March 15, 2019 • Zane Pokorny

The best way to manage vulnerabilities is to prioritize them based on the actual threat they pose, which can be done with accurate threat intelligence.

Talking to RATs: Assessing Corporate Risk by Analyzing Remote Access Trojan Infections

March 14, 2019 • Insikt Group

Insikt Group analyzes network communications relating to a selection of RAT command-and-control servers to profile targeted victim organizations.

Security Panel Insights: Being Asked a Great Question and Not Realizing It Until Later

March 13, 2019 • Darian Lewis

Darian Lewis, lead threat intelligence analyst at Relativity, reflects on his experience participating in a panel with us at RSA Conference 2019.