March 25, 2019 • Zane Pokorny
To celebrate one hundred episodes of our podcast, the grugq joins us to discuss the history of influence operations, why they work, and what may be to come.
March 22, 2019 • Zane Pokorny
We look at some of the ways to determine whether a file is legitimate and explain how these methods can be augmented by real-time threat intelligence.
March 21, 2019 • Zane Pokorny
A new report by Thomas H. Davenport breaks down cyber risk scores and the philosophy behind Recorded Future’s third-party risk management solution.
March 20, 2019 • Zane Pokorny
We survey the National Intelligence Strategy, a framework for intelligence operations, and explain how cyber threat intelligence supports its objectives.
• Allan Liska
Norwegian aluminum company Norsk Hydro was recently targeted by LockerGoga, a relatively new strain of ransomware first discovered in January 2019.
March 19, 2019 • Kathleen Kuczma
In this report, we analyze thousands of sources, including code repositories and dark web sites, to share insight into the top 10 vulnerabilities from 2018.
March 18, 2019 • Zane Pokorny
Priscilla Moriuchi discusses Insikt Group's recently published findings from their research into Chinese efforts to sway public opinion via social media.
March 15, 2019 • Zane Pokorny
The best way to manage vulnerabilities is to prioritize them based on the actual threat they pose, which can be done with accurate threat intelligence.
March 14, 2019 • Insikt Group
Insikt Group analyzes network communications relating to a selection of RAT command-and-control servers to profile targeted victim organizations.
March 13, 2019 • Darian Lewis
Darian Lewis, lead threat intelligence analyst at Relativity, reflects on his experience participating in a panel with us at RSA Conference 2019.