{"total":3,"offset":0,"limit":3,"data":[{"thumbnail":"https://www.recordedfuture.com/graphics/whitepaper-threat-intelligence-aa82bdb677.jpg","date":"","title":"Cyber Operations Data Sheet","description":"Empower your organization to identify, investigate, and prioritize cyber threats.","link":"https://assets.recordedfuture.com/Datasheets/2026_0313%20-%20CyberOps%20Datasheet.pdf","tags":""},{"thumbnail":"https://www.recordedfuture.com/graphics/reports/e-book.png","date":"","title":"From 27 Steps to 5","description":"Gain real-time insights to help you identify compromised IOCs and defend against cyber attackers.","link":"https://www.recordedfuture.com/blog/threat-hunting-27-steps-to-5","tags":""},{"thumbnail":"https://www.recordedfuture.com/graphics/resources/media_1420a94edff6ea86dbab55e72e595bb5dcabcdfac.png","date":"","title":"2025 State of Threat Intelligence","description":"Transform cyber operations with autonomous hunting that operates 24/7 and makes decisions independently.","link":"https://assets.recordedfuture.com/Datasheets/Recorded_Future_Autonomous_Threat_Operations.pdf","tags":""}],"columns":["thumbnail","date","title","description","link","tags"],":type":"sheet"}