{"total":3,"offset":0,"limit":3,"data":[{"thumbnail":"https://www.recordedfuture.com/graphics/datasheet-security-intelligence-solutions-overview-5b42c3713d.jpg","date":"","title":"Building and Operationalizing an Empowered CTI Team","description":"Learn from the Canva team how they got into their current roles, recommendations for getting buy-in for a CTI program, and how to showcase value to the rest of the organization.","link":"/blog/building-and-operationalising-an-empowered-cti-team","tags":"Blog"},{"thumbnail":"https://www.recordedfuture.com/graphics/reduce-threat-detection-investigation-response-time-hero-mobile-beb07aaa82.png","date":"","title":"Flying Under the Radar: Abusing GitHub for Malicious Infrastructure","description":"New Insikt Group research discusses the frequent abuse of GitHub's services by cybercriminals and advanced persistent threats (APTs) for various malicious infrastructure schemes.","link":"/research/flying-under-the-radar-abusing-github-malicious-infrastructure","tags":"Research"},{"thumbnail":"https://www.recordedfuture.com/graphics/datasheet-security-intelligence-solutions-overview-5b42c3713d.jpg","date":"","title":"In Before The Lock: ESXi","description":"As organizations continue virtualizing their critical infrastructure and business systems, threat actors deploying ransomware have responded in kind. Our research team explores, and dives into tactics and how to defend against them.","link":"/research/in-before-the-lock-esxi","tags":"Research"}],"columns":["thumbnail","date","title","description","link","tags"],":type":"sheet"}