We’re passionate about security and technology — and we’re leading the charge in threat intelligence to revolutionize them all. Some of these articles cover research from our team of world-class analysts or advancements in our unique technology.


Insight Partners Acquires Recorded Future for $780 Million

Recorded Future Launches Plug and Play Browser Extension Providing Seamless Access to Threat Intelligence

Recorded Future Unveils Third-Party Risk Intelligence for Comprehensive View of Cyber Threats

Recorded Future Added to the Department of Homeland Security’s Continuous Diagnostics and Mitigation Program’s Approved Products List

Recorded Future Honored With 2018 CRN Tech Innovator Award

Recorded Future Annual Conference Highlights Growing Demand for Threat Intelligence

Recorded Future Lookup App Now Available on the Palo Alto Networks Application Framework

Recorded Future Named 'Most Innovative Threat Intelligence' by Cyber Defense Magazine

Recorded Future Announces Two Free Resources for Practical Application of Threat Intelligence

Recorded Future Earns Top Spot From SC Media in Threat Intelligence Group Review

Recorded Future Introduces Takedown Services to Complete Comprehensive Brand Protection Offering

Recorded Future Recognized as a Leader in Digital Risk Protection by Independent Research Firm

Recorded Future Honored With 'Best Threat Intelligence Technology' at SC Awards Europe

Recorded Future Connect Xchange: Alliance for Intelligence-Driven Security

Recorded Future Fusion Hits Prime Time

Recorded Future Launches Fusion to Deliver the First Universal Threat Intelligence Solution

Recorded Future Expands Automated Threat Intelligence Solution With Analyst-Originated Intelligence

Recorded Future Raises $25M From Insight Venture Partners to Further Extend Leading Position in Threat Intelligence

More Than 70% of Recorded Future Customers Are Using Its Dark Web-Sourced Intelligence

Recorded Future Introduces Dynamic Threat Views to Surface Risk-Based, Relevant Intelligence

Recorded Future Earns an Outstanding Net Promoter Score of 60

Recorded Future Expands File Reputation Data by 150X

Recorded Future Launches Value Added Reseller Partner Program

More Than Three Quarters of Vulnerabilities Are Disclosed on Dark Web and Security Sources Before National Vulnerability Database Publication

Recorded Future Launches Threat Research Arm to Enhance Threat Intelligence Offering

Shodan and Recorded Future Release Malware Hunter

Combining Technical, Open, and Dark Web Sources of Threat Intelligence for the First Time

Recorded Future to Speak on Ransomware and the Dark Web at RSA Conference USA 2017

Recorded Future Adds Technical Threat Intelligence to Fuel All-Source Analysis Breakthrough

Recorded Future Receives Splunk Certification

Recorded Future Announces Its Participation in Splunk’s Adaptive Response Initiative

Lab Test Reveals 10X Productivity Gain From Real-Time Threat Intelligence for SIEMs

Turbocharge Your Threat Hunting Capability With Intelligent TTP Alerting

Now Available: All-Source Analysis Capability

An Immediate Starting Point for Research on Threat Actor Groups

All-Source Analysis Breakthrough With New Recorded Future OMNI Intelligence Partner Integrations

Announcing Recorded Future and Vencore GEOINT Partnership

Announcing Recorded Future for Palo Alto Networks

Announcing Recorded Future for Splunk

Press Mentions 2019

May 2019 | GDPR Report Wormable' bug could cause another WannaCry

May 2019 | Computer Buisness Review Microsoft Credits NCSC for Critical Bug Find, Pushes Out Unusual Patch

May 2019 | Infosecurity "Wormable" bug could enable another wannacry

May 2019 | Security Week Hackers Add Security Software Removal to Banload Banking Malware

May 2019 | SC Magazine Microsoft Sharepoint vulnerability spotted in the wild, likely being exploited

April 2019 | IDG Connect Pirates of Brazil: An introduction to the Brazillian cyber underground

April 2019 | Daily Swig Spain on the front line of election security ahead of EU-wide poll

April 2019 | ZD Net An inside look at how credential stuffing operations work

April 2019 | Financial Times What are the main security risks of using Huawei for 5G?

April 2019 | Information Age How ransomware continues to target businesses and what to do about it

April 2019 | Infosecurity Microsoft Fixes Another Two Zero Days in Patch Avalanche

March 2019 | FX Street Litecoin price analysis: LTC/USD test $125.00, more downside in store

March 2019 | The Express Litecoin price news: What is the current value of Litecoin? Is LTC DEAD?

March 2019 | Security Week The Top Vulnerabilities Exploited by Cybercriminals

March 2019 | The Register Exploit kit development has gone to sh$t… ever since Adobe Flash was kicked to the curb

March 2019 | The Express Cryptocurrency dark web: Next most popular cryptocurrency among cyber criminals REVEALED

March 2019 | Security Brief Europe New research finds China tampering with public vulnerability data

March 2019 | The Register China ALTERED its public vuln database to conceal spy agency tinkering – research

March 2019 | The Times Bitcoin, Ethereum, ripple XRP: a guide to cryptocurrencies

March 2019 | Security Week New North Korea-linked Cyberattacks Target Financial Institutions

March 2019 | V3 China accused of taking the best submissions to national vulnerability database for cyber espionage – then concealing the evidence

March 2019 | Infosecurity China Backdated Bug Disclosures to Hide State Hacking: Report

March 2019 | SC Media Chinese Ministry of State Security caught manipulating critical CVE data

March 2019 | Teiss China altering its vulnerability data: why it matters

March 2019 | Information Security Buzz 2018 Ransomware Trends (YouTube)

March 2019 | Information Security Buzz 2018 Ransomware Trends

March 2019 | Verdict Encrypt Drowning in Data: Transforming Threat Intelligence for the Better

March 2019 | The Telegraph North Korea may have made as much as $200 million from Bitcoin, according to expert

March 2019 | IDG Connect North Korea pursues cryptocurrency exchanges in South Korea

March 2019 | ASSOCIATED PRESS Facebook left millions of passwords readable by employees

March 2019 | CSO What are the new China Cybersecurity Law provisions? And how CISOs should respond

March 2019 | KREBS ON SECURITY Patch Tuesday, March 2019 Edition

March 2019 | DARK READING Microsoft Office Dominates Most Exploited List

March 2019 | SC MAGAZINE Report reveals how China leverages social media to influence U.S.

March 2019 | THE HILL Researchers: Chinese influence operations seek to elevate China's image, not sow discord

February 2019 | V3 Counterfeit code-signing certificates enabling hackers to hide malware being sold by cyber criminals

February 2019 | Help Net Security Counterfeit digital certificates for sale on underground forums

February 2019 | Security Week Use of Fake Code Signing Certificates in Malware Surges

February 2019 | Security Brief Europe Rumours fly about who was behind the PyeongChang Olympics hack

February 2019 | Computer Weekly Atos investigates breach linked to Winter Olympics cyber attack

February 2019 | The Block Winter shows Litecoin as second most dominant coin on the dark web

February 2019 | Security Week Litecoin, Dash to Dethrone Bitcoin on Dark Web: Report

February 2019 | Silicon republic Winter Olympics cyber attack is shrouded in mystery

February 2019 | Tech Radar Pro Bitcoin’s slipping as dark web looks to crown a new king of the cryptocurrencies

February 2019 | ASSOCIATED PRESS Experts: US anti-Huawei campaign likely exaggerated

February 2019 | CYBERSCOOP Hack of billion-dollar Norwegian firm is tied to Chinese espionage group APT10

February 2019 | CRN WATCH: Recorded Future Exec On New Channel-Friendly Security Software That Works In Any Web-Based Application

February 2019 | GCN 5 steps for a successful public-private cyber crime fighting partnership

February 2019 | NEW YORK TIMES Chinese and Iranian Hackers Renew Their Attacks on U.S. Companies

February 2019 | MIT TECH REVIEW A Norwegian cloud computing firm has been hit by a Chinese cyberattack

February 2019 | REUTERS China hacked Norway's Visma to steal client secrets - investigators

February 2019 | SECURITY AFFAIRS Security firm Recorded Future discovered the hacker behind Collection #1

February 2019 | ZDNET China's cybersecurity law update lets state agencies 'pen-test' local companies

January 2019 | Digitalisation World Recorded Future launches Fusion

January 2019 | The Independent North Korea is stealing bitcoin and the threat to cryptocurrency investors is growing, experts warn

January 2019 | Business Insider UK New evidence reportedly puts North Korean hackers behind a list of high-stakes bitcoin heists

January 2019 | World Finance North Korean hackers behind South Korean cryptocurrency attacks, say researchers

January 2019 | International Business Times Lazarus: North Korean hackers linked to Sony hack were behind cryptocurrency attacks in South Korea

January 2019 | Computer Weekly North Korean hackers tied to cryptocurrency attacks in South Korea

January 2019 | Security Week North Korean Hackers Prep Attacks Against Cryptocurrency Exchanges: Report

January 2019 | IDG Connect Could Huawei smartphone deal fail spell full-blown Sino-US trade war?

January 2019 | Info security buzz Vendors Rush To Patch Meltdown And Spectre Vulnerabilities

January 2019 | SC Media UK Meltdown and Spectre – vulnerabilities to watch (and fix)

January 2019 | SC Media UK Why are cyber-criminals dumping Bitcoin

January 2019 | ASSOCIATED PRESS Fewer affected in Marriott hack, but passports a red flag

January 2019 | CNBC New research shows how Iranian hackers have collaborated to become one of the world’s most fearsome hacking forces

January 2019 | CHANNEL BUZZ Recorded Future introduces new module to provide dynamic analysis of risks incurred from third-party relationships

January 2019 | KREBS ON SECURITY Patch Tuesday, January 2019 Edition

January 2019 | PRI THE WORLD Marriott hotel hack update

January 2019 | SECURITY WEEK The Rise and Fall of Ashiyane - Iran's Foremost Hacker Forum

January 2019 | SECURITY WEEK Recorded Future Adds Third-Party Risk to Threat Intelligence Platform

January 2019 | WASHINGTON POST Marriott: Hackers accessed more than 5 million passport numbers during November’s massive data breach

January 2019 | WSJ CYBERSECURITY PRO Cyber Daily: Passport Thieves; Power Grid Hackers

Press Mentions 2010-2018

December 2018 | IT Pro Portal Back to the future for 2019

December 2018 | Security Week Industry Reactions to U.S. Charging APT10 Hackers: Feedback Friday

December 2018 | Financial Times Who is the Chinese group blamed for cyber-attacks on the west?

December 2018 | The Daily Swig State-backed hackers switch to inferior tactics to avoid being fingered for attacks

December 2018 | Infosecurity Microsoft and Adobe Patch 100+ Bugs in December

December 2018 | Forbes Marriott’s 500 Million Hack Blamed On China - Should You Believe It?

December 2018 | The Telegraph Former NSA official urges Britain to block Huawei technology over ‘legitimate security concerns’

December 2018 | Verdict Encrypt Tessa88 unmasked

December 2018 | Associated Press Voter records offered for sale month ahead of elections

December 2018 | CBS Radio New York Times Reports World's Largest Companies Expose User Data

December 2018 | CNN US charges Chinese hackers in global scheme targeting business and military

December 2018 | New York Times China’s ‘Belt and Road’ Plan in Pakistan Takes a Military Turn

December 2018 | Wall Street Journal Marriott’s Starwood Missed Chance to Detect Huge Data Breach Years Earlier, Cybersecurity Specialists Say

December 2018 | Wall Street Journal To Fight This Generation of Hackers, Companies Take a Cue from Spies

November 2018 | Security Week Chinese Hackers Target UK Engineering Company: Report

November 2018 | Information Security Buzz Internet Traffic Hijack Disrupts Google Services

November 2018 | SC Magazine UK Chinese hackers using Russian tactics to attack UK firms

November 2018 | The Express Midterm elections 2018: Russia is targeting US voters, warns FBI – Facebook removes pages

November 2018 | The Daily Swig Spoiling the ballot: Cyber fears cloud US midterm elections

November 2018 | IDG Connect An introduction to the Russian-language underground

November 2018 | Daily Mail Russia seen adopting new tactics in U.S. election interference efforts

November 2018 | Verdict US midterms: Efforts of Russian “right trolls” ramped up in run-up to election

November 2018 | AXIOS How Yemen's civil war went cyber

November 2018 | FOREIGN POLICY The Other War in Yemen—for Control of the Country’s Internet

November 2018 | REUTERS Russia seen adopting new tactics in U.S. election interference efforts

November 2018 | SC MAGAZINE Suspected TEMP.Periscope phishing campaign adopts Russian APT techniques

November 2018 | THE HILL Security firm says identity of renowned hacker is Russian national

November 2018 | THREATPOST Microsoft Patches Zero-Day Bug in Win7, Server 2008 and 2008 R2

November 2018 | ZDNET Cyber-security firm doxxes hacker who sold MySpace and Dropbox databases in 2016

October 2018 | Data Breach Today Crypto-Locking Kraken Ransomware Looms Larger

October 2018 | Bank Info Security Crypto-Locking Kraken Ransomware Looms Larger

October 2018 | Verdict North Korea cryptocurrency scam raised for Kim regime

October 2018 | The Telegraph LinkedIn becomes social media of choice for North Korea’s elite

October 2018 | SC Magazine North Korea regime using and exploiting cryptocurrencies

October 2018 | The Amed Post Chinese hackers are driven by patriotism, while Russians are driven by greed

October 2018 | Global Defence Magazine Drone planes for sale: Military documents on the dark web

October 2018 | The Register China’s clampdown on Tor pushes its hackers into foreign backyards

October 2018 | DARK READING Kraken Resurfaces From the Deep Web

October 2018 | FORBES Cybersecurity Needs Women: Here's Why

October 2018 | FOREIGN POLICY Chinese Spy Ops, Something Old, Something New

October 2018 | FOX NEWS Chinese hackers are driven by patriotism, while Russians are driven by greed

October 2018 | NEWSWEEK North Korea Regime is Making Money from Cryptocurrency Scam that Offered Users Ownership of Ships: Report

October 2018 | WASHINGTON POST The Cybersecurity 202: Trump's refusal to give up his iPhone sets dangerous precedent

October 2018 | ZDNET A deep dive into the forces driving Russian and Chinese hacker forums

September 2018 | Verdict Encrypt Drone Plans for Sale: How White Hat Hackers Infiltrated a Criminal Gang Selling Military Documents

September 2018 | Verdict North Korea backed cyber-attacks appear to be funding Kim Jong-Un regime

September 2018 | CSO Online What is a botnet? And why they aren't going away anytime soon

September 2018 | Dark Reading The 'Opsec Fail' That Helped Unmask a North Korean State Hacker

September 2018 | IT Tool Box Researcher Reveals Microsoft Windows “Zero Day” Vulnerability

September 2018 | New York Times Inside Facebook’s Election ‘War Room’

September 2018 | Newsweek China Uses Cyberespionage to Gain Military Advantage

September 2018 | Maclean’s Canada is plagued by Bitcoin ransoms—and there’s no help in sight

September 2018 | POLITICO What’s next for data breach legislation?

September 2018 | The Parallax Triaging modern medicine’s cybersecurity issues

September 2018 | Wall Street Journal How Dirty Money Disappears Into the Black Hole of Cryptocurrency

August 2018 | Associated Press US braces for possible cyber attacks after Iran sanctions

August 2018 | Alaska’s NPR Affiliate

August 2018 | CNET

August 2018 | Fast Company

August 2018 | Newsweek

August 2018 | Reuters

August 2018 | The Hill

August 2018 | SC Magazine

August 2018 | Fast Company
Hackers Beware: These Stealthy Cybersecurity Hunters Speak Your Slang

August 2018 | Reuters
Chinese Hackers Targeted US Firms, Government After Trade Mission: Researchers

July 2018 | The Register
Russia's National Vulnerability Database Is a Bit Like the Soviet Union — Sparse and Slow

July 2018 | The Wall Street Journal
Stolen US Military Drone Documents Found for Sale on Dark Web, Researchers Say

July 2018 | CNN
US Reaper Drone Data Leaked on Dark Web, Researchers Say

June 2018 | eWEEK
Recorded Future: Product Overview and Insight

June 2018 | Fox News
North Korea's Leadership Loves iPhones, Report Says

June 2018 | Fortune
North Korea Uses Microsoft and Apple Technology for Cyberattacks, Researchers Say

June 2018 | Washington Post
North Korean Elites Get the Latest Tech – Including iPhone X – Despite Sanctions, Report Finds

May 2018 | WIRED
The Iran Nuclear Deal’s Unraveling Raises Fears of Cyberattacks

May 2018 | Daily Mail
Iran Likely to Launch Cyberattacks on Western Businesses

April 2018 | Reuters
Croatian Police Arrest Suspect Behind Global Cyber Attack Platform

April 2018 | Forbes
Even North Korea's Elites Are Ditching Facebook

April 2018 | Financial Times
North Korea Elite Drop Western Websites to Avoid Online Scrutiny

April 2018 | CRN
Recorded Future Turns to the Channel to Help Build Integrations With Other Vendors

April 2018 | SC Media
Mirai Variant That Struck Financial Institutions in January Detailed

April 2018 | Infosecurity Magazine
Echoes of Mirai: New IoT Botnet Targets Financial Firms

March 2018 | New York Times
A Cyberattack Hobbles Atlanta, and Security Experts Shudder

March 2018 | Financial Times
China Hackers Ordered to Report Software Holes to Spy Agency

March 2018 | The Telegraph
North Korea May Have Made as Much as $200 Million From Bitcoin

February 2018 | ZDNet
Hackers Are Selling Legitimate Code-Signing Certificates to Evade Malware Detection

February 2018 | Ars Technica
One-Stop Counterfeit Certificate Shops for All Your Malware-Signing Needs

February 2018 | Fortune
Litecoin Is Now a Surprise Favorite of Criminals Tired of Bitcoin

February 2018 | Bloomberg
Criminals Are Ditching Bitcoin for Litecoin and Dash, Study Says

January 2018 | BetaNews
New Solution Delivers Universal Threat Intelligence

January 2018 |
Recorded Future Adds Fusion End-to-End Threat Intelligence Solution

November 2017 | Dark Reading
Recorded Future Named Top Threat Intelligence Vendor to Watch in 2018

October 2017 | Fortune
Exclusive: This Cybersecurity Startup Raised $25M to Expand Dark Web Intel Service

October 2017 | Fortune
A Hacker's Tool Kit

October 2017 | Bloomberg Businessweek
The U.S. Lags Behind China in Spotting Cyberthreats

September 2017 | CNBC
Bitcoin 'Mining': A New Way for North Korea to Generate Funds for the Regime

September 2017 | Gizmodo
Hackers Have Already Started to Weaponize Artificial Intelligence

August 2017 | Fortune
Why the Honor Code Among Hackers Has Broken Down

August 2017 | Infosecurity Magazine
Records Leaked for 25 Footballers Using Banned Substances in 2010 World Cup

August 2017 | Washington Post
New Zealand Denies Visas to North Korean Academics to Attend Conference

July 2017 | BBC
Hiding Out Among the Net's Criminal Class

July 2017 | International Business Times
Is Kim Jong-Un on World of Tanks? The Internet Habits of North Korea's Elite Revealed

July 2017 | Washington Post
Not So Isolated: North Korea's Elite Uses Gmail, Facebook, and iTunes

July 2017 | The Wall Street Journal
GOP Seeks to Close Federal Election Agency

July 2017 | Dark Reading
New SQL Injection Tool Makes Attacks Possible From a Smartphone

July 2017 | Threatpost
Telegram-Controlled Hacking Tool Targets SQL Injection at Scale

July 2017 | SecurityWeek
SQLi Vulnerability Scanner Available on Hacking Forum at $500

July 2017 | SC Media
SQL Vulnerability Scanner 'Katyusha' Operable via Telegram App

June 2017 | ZDNet
The Dark Web Is the Place to Go to Find Bugs Before Public Disclosure

June 2017 | Dark Reading
75% of Vulns Shared Online Before NVD Publication

May 2017 | Infosecurity Magazine
German Threat Actor Spreads Houdini Worm on Pastebin

May 2017 | Dark Reading
APT3 Threat Group a Contractor for Chinese Intelligence Agency

May 2017 | New York Times
Ransomware’s Aftershocks Feared as US Warns of Complexity

May 2017 | SC Media UK
Russian Fatboy Ransomware-as-a-Service Offers Customer Support Over Jabber

May 2017 | The Register
How Do Ransomware Scum Decide What to Charge You? The Big Mac Index

May 2017 | ZDNet
Rich? This Ransomware Will Charge You More to Unlock Your Encrypted Files

May 2017 | Dark Reading
New Free Shodan Tool Roots Out RATs

May 2017 | SecurityWeek
'Malware Hunter' Helps Researchers Find C&C Servers

April 2017 | Infosecurity Magazine
Shadow Brokers Attack Tools Light Up Chinese and Russian Darknet

April 2017 | CyberScoop
Leaked NSA Hacking Tools Are a Hit on the Dark Web

April 2017 | BankInfoSecurity
Want to Get Into Ransomware? This Kit Costs Just $175

April 2017 | International Business Times
This New Dark Web Ransomware-as-a-Service Is Customized So Any Script Kiddie Can Launch Attacks

April 2017 | Dark Reading
Advanced, Low-Cost Ransomware Tools on the Rise

April 2017 | SecurityWeek
Karmen Ransomware Deletes Decryptor If Sandbox Is Detected

April 2017 | BleepingComputer
New Karmen Ransomware-as-a-Service Advertised on Hacking Forums

April 2017 | Security Affairs
Karmen Ransomware, a Cheap RaaS Service That Implements Anti-Analysis Features

April 2017 | CyberScoop
Cheap and Effective Ransomware-as-a-Service Introduced in Russian Underground

April 2017 | The Hacker News
Russian Hacker Selling Cheap Ransomware-as-a-Service on Dark Web

April 2017 | PCWorld
At $175, This Ransomware Service Is a Boon to Cyber Criminals

April 2017 | Threatpost
Low-Cost Ransomware Service Discovered

April 2017 | SC Media
Karmen Ransomware Seduces Novice Cybercriminals With Affordability, Ease of Use

April 2017 | Infosecurity Magazine
Karmen Ransomware: User-Friendly, Sandbox-Averse

April 2017 | ZDNet
A Russian Hacker Has Created His Own 'Starter Pack' Ransomware Service

April 2017 | The Register
Profit With Just One Infection! Crook Sells Ransomware for $175

April 2017 | International Business Times
What Happens to Your Data Once It Is on the Dark Web?

April 2017 | Fortune
Russian Hackers Are Afraid to Travel After US Arrests Spam King

March 2017 | Momentum Partners
Momentum Partners Releases Its 2nd Annual Watch List After the 2017 RSA Conference

February 2017 | International Business Times
Russian Hacker Rasputin Hacked Over 60 US Government Agencies and International Universities

February 2017 | The Hill
Russian-Speaking Hacker Breached HUD, Security Firm Says

February 2017 | Computerworld
Hacker Breached 63 Universities and Government Agencies

February 2017 | Fortune
Hacker Breached Dozens of Universities and Government Agencies, Report Says

February 2017 | ZDNet
Recorded Future Expands Platform to Scan Every Source on the Web for Digital Threats

January 2017 | IDG Connect
Will a Cyber War DéTente Result in Businesses Facing More Cyber Crime?

January 2017 | SC Media
Arenas Entertainment Hit With Ransomware Demand

January 2017 | CSO Online
Ransomware Took in $1 Billion in 2016

December 2016 | Reuters
US Election Agency Breached by Hackers After November Vote

December 2016 | BBC
US Hacking Claims: Russia Says 'Indecent' Without Evidence

December 2016 | TechCrunch
The Government Body That Oversees the Security of Voting Systems Was Itself Hacked

December 2016 | The Register
US Voting Machine Certification Agency Probes Potential Hack

December 2016 | The Huffington Post
Hackers Breached US Election Agency After Vote, According to Security Firm

December 2016 | BuzzFeed
US Agency That Certifies Voting Machines Was Hacked, Firm Says

December 2016 | SC Media
Hackers Hide Base64-Encoded PowerShell Scripts on Pastebin

December 2016 | CIO
Know Your (Cyber) Enemy

December 2016 | Krebs on Security
New Critical Fixes for Flash, MS Windows

December 2016 | Infosecurity Magazine
On the Seventh Day of Christmas, the Industry Predicted ... More Mention of AI

December 2016 | Forbes
2016 Was Another Huge Year For Adobe Flash Attacks

December 2016 | SC Media
Q&A With Andrei Barysevich

December 2016 | The Register
Need Xmas Ideas? Try CVE-2015-7645, a Flash Gift That Keeps on Giving

December 2016 | InfoWorld
Flash Player Remains Target of Choice for Exploit Kits

December 2016 | TechTarget
Exploit Kit Delivered via Malvertising Targets Unpatched Systems

December 2016 | Graham Cluley
Adobe Flash Responsible for 6 of the Top 10 Bugs Used by Exploit Kits in 2016

December 2016 | Threatpost
Flash Exploit Found in 7 Exploit Kits

December 2016 | Dark Reading
Adobe Flash Flaws Dominate Exploit Kits In 2016

December 2016 | SecurityWeek
Flash Player Remains Main Target of Exploit Kits: Report

December 2016 | NBC News
Who's Next, After San Francisco's Public Transit System Got Hacked?

December 2016 | IDG Connect
Does Hacking Pay?

November 2016 | SC Media
Most Cyber Criminals Earn $1K to $3K a Month, Report

November 2016 | CSO Online
Report: Most Cyber Criminals Earn $1,000 to $3,000 a Month

November 2016 | Network World
How to Dodge Black Friday and Cyber Monday Shopping Hackers

November 2016 | SC Media
Cybercriminals, as Usual, Make the Naughty List

November 2016 | Inc.
Making Sense of a Trump Presidency

November 2016 | The Christian Science Monitor
Why Election Day Hacking Risks Are Overblown

October 2016 | WIRED
Is Cyber Security Broken? Building Walls Won't Prevent Hacks, Predicting the Future Will

October 2016 | Motherboard
How Hackers Plant False Flags to Hide Their Real Identities

October 2016 | CSO Online
Q&A: The Myths and Realities of Hacking an Election

September 2016 | Dark Reading
Decrypting the Dark Web: Patterns Inside Hacker Forum Activity

September 2016 | Motherboard
This Cyber Security Firm Maps Hackers' Lives by the Clues They Leave Online

August 2016 | Cybersecurity Ventures
Meet the Hot Cybersecurity Companies to Watch in 2016

August 2016 | SC Media
Voter Database Hack in Illinois by Foreign Intruder Compromises Info of 200K

June 2016 | InfoWorld
Hack the Hackers: Eavesdrop for Intel on Emerging Threats

June 2016 | IT Business Edge
Recorded Future Extends Reach of Security Intelligence Service

June 2016 | Network World
Recorded Future Aligns With Other Threat Intelligence Vendors

June 2016 | ZDNet
Recorded Future Partners With Top Cyber Security Firms in Threat Analysis Boost

May 2016 | Infosecurity Magazine
Proof of Concepts Soared 200% in 2015

May 2016 | Dark Reading
Proof-of-Concept Exploit Sharing Is on the Rise

May 2016 | The Register
Miscreants Tripled Output of Proof of Concept Exploits in 2015

April 2016 | The Wall Street Journal
Twitter and Islamic State Deadlock on Social Media Battlefield

April 2016 | Reuters
Recorded Future Announces Integration With Palo Alto Networks

March 2016 | The Wall Street Journal
Healthcare CIOs, Facing Ransomware Threat, Share Security Best Practices

March 2016 | InfoWorld
Ransomware Targets Flash and Silverlight Vulnerabilities

March 2016 | Dark Reading
Here Are 4 Vulnerabilities Ransomware Attacks Are Exploiting Now

March 2016 | The Register
BlackEnergy Malware Activity Spiked in Runup to Ukraine Power Grid Takedown

February 2016 | Hindustan Times
Cyber Attacks a Legitimate Worry Ahead of India-Pak Asia Cup Clash

February 2016 | The Times of India
Indian Websites More Prone to Pakistan-Based Hacker Attacks on Big Events

February 2016 | SC Media
India and Pakistan Tensions Go Online

February 2016 | The Register
Cricket Can Get Nasty: India vs. Pakistan Rivalry Boils Over Into Cyber War

February 2016 | CSO Online
Does Attribution Matter to Security Leaders?

January 2016 | The Christian Science Monitor
Iran-Saudi Arabia Row Adds Fuel for Hackers on Both Sides

December 2015 | CNBC
Cyber Attackers Using Bitcoin, Despite Traceability

December 2015 | Threatpost
Bitcoin Extortionist Copycats on the Rise, Experts Say

December 2015 | Softpedia
Unknown Copycat Using Armada Collective Name for DDoS-for-Bitcoin Extortions

December 2015 | Dark Reading
Cyber Extortion, DDoS-for-Bitcoin Campaigns Rise

December 2015 | SecurityWeek
DD4BC, Armada Collective Inspire Cyber Extortion Copycats

November 2015 | eWEEK
Analysis Finds Flash Top Exploit Target as Adobe Fixes Latest Flaws

November 2015 | Krebs on Security
Critical Fixes for Windows, Adobe Flash Player

November 2015 | Network World
8 of Top 10 Vulnerabilities Used by Exploit Kits Target Adobe Flash Player

November 2015 | PCWorld
No Surprise Here: Adobe's Flash Is a Hacker's Favorite Target

November 2015 | SC Media
Patch Tuesday: Adobe Addresses 17 Critical Vulnerabilities in Flash

November 2015 | SecurityWeek
Flash Flaws Most Common in Exploit Kits: Report

October 2015 | The Times
Hackers' Threat to Dump 1.2M Stolen TalkTalk Details Online

October 2015 | SC Media
Iranian Hackers Show Growing Interest in Android RATs

October 2015 | The Register
Iranian VXers Unleash RATs to Bite Popular Android Devices

October 2015 | CSO Online
Iranian Hackers Get Tech Support on Forums

October 2015 | TechCrunch
Connected Car Security: Separating Fear From Fact

September 2015 | eWEEK
Sloppy Remote Access Trojan Operators Show Up in Internet Scans

September 2015 | Dark Reading
New Tactic Finds RAT Operators Fast

September 2015 | EE Times
SCADA Vulnerability on the Rise

September 2015 | SecurityWeek
Russian Hackers Target Industrial Control Systems: US Intel Chief

September 2015 | InfoWorld
Reports of Attacks on the Department of Energy Raise Alarms

September 2015 | SecurityWeek
ICS Flaw Disclosures at High Levels Since Stuxnet Attack: Report

August 2015 | The Register
Blacklists Miss 90% of Malware Blogged IP Love

August 2015 | CSO Online
New IP Address Blacklist Based on Web Chatter

July 2015 | CSO Online
How to Surf the Dark Web for Fun and Profit

July 2015 | The Christian Science Monitor
Opinion: The Value of Unmasking Tor's Dark Side

June 2015 | TechTarget
US Government Passwords Stolen and Leaked Around the Web

June 2015 | eSecurity Planet
US Government Login Credentials Found Online

June 2015 | International Business Times
Iran and Saudi Arabia Heading Toward a Cyber War?

June 2015 | Washington Times
The US Government Hasn't Learned How to Keep Sensitive Data Secret

June 2015 | The Federal Drive
The Federal Drive: Agency Logins on the Open Web

June 2015 | Fox News
Iran and Saudi Arabia Edge Towards Cyber War, Study Says

June 2015 | VICE
There's Evidence the 'Yemen Cyber Army' Is Actually Iranian

June 2015 | Washington Post
Theft of Saudi Documents Suggests an Iranian Hack

June 2015 | Naked Security
Stolen Logins for US Government Agencies Found All Over the Web

June 2015 | CIO TODAY
Tech Company Finds Leaked US Government Logins, Passwords Online

June 2015 | Federal Times
Government Logins Widely Available Online

June 2015 | SC Media
Study: Leaked Credentials on Pastebin, Similar Sites, Linked to 47 Government Agencies

June 2015 | BBC News
US Government Logins and Passwords Leaked Online

June 2015 | Threatpost
Stolen Government Agency Passwords Easy to Find Online

June 2015 | Business Insider
Login Credentials From 47 Government Agencies Discovered on the Internet

June 2015 | ZDNet
Stolen US Government Passwords Leaked Across Web

June 2015 | Infosecurity Magazine
Stolen Government Logins Available All Over the Web

June 2015 | Tom's Hardware
Report: Security of US Agencies in Dire State, Employee Logins Widely Leaked

June 2015 | FCW
Report: 47 Agencies Face Possible Login Credential Exposure

June 2015 | Associated Press
Tech Company Finds Stolen Government Logins All Over Web

June 2015 | WRAL TechWire
CIA-Backed Tech Company Finds Stolen Government Logins All Over Web

June 2015 | The Hill
Government Passwords Scattered Across the Web, Study Finds

June 2015 | CBS News
Report: EMails, Passwords From 47 Government Agencies Leaked Online

June 2015 | Boston Business Journal
Cambridge Firm Says Recent Breaches Left Dozens of Federal Agencies Open to Espionage, Theft

June 2015 | The Register
Login Creds for US Agencies Found Scrawled on the Web's Toilet Walls

June 2015 | Wired Magazine
Hundreds of .Gov Credentials Found in Public Hacker Dumps

June 2015 | The Wall Street Journal
Breached Network’s Security Is Criticized

June 2015 | Business Insider
Computers Can Now Tell Between Real Breaking News and Internet Trolls Trying to Dupe Us

May 2015 | Business Insider
Lizard Squad: Original Pranksters

May 2015 | Business Insider
Inside the Company That Can Predict the Future by Analyzing the Web

April 2015 | Beyond Search
Recorded Future: The Threat Detection Leader

April 2015 | VICE
Small-Time Hackers Can Be Deanonymized Even When Using Tor

April 2015 | Xconomy
Diving Deeper Into Cyber Security, Recorded Future Reels in $12M

April 2015 | BostInno
Recorded Future Has Raised $12M for its Cyber Threat Web Crawling Service

April 2015 | The Christian Science Monitor
Opinion: Threat Intelligence is the Judo Move Needed to Take Down Hackers

February 2015 | Svenska Dagbladet
Explosive Increase in Saudi Tributes to the Islamic State

February 2015 | Sky News
More Twitter Activity Than Ever Over IS

February 2015 | VICE
The Closest Thing to a Map of the Dark Net: Pastebin

February 2015 | SC Media
SC Lab Approved: Recorded Future Cyber

January 2015 | The Wall Street Journal
An Optimistic Lens on Cyber Security

December 2014 | eWEEK
Network Defenders Have About a Week to Patch Flaw, Study Finds

November 2014 | eWEEK
Cyber Threats Ascribed to Russia Crafted to Hunt Specific Data

November 2014 | Dark Reading
Russian Cyber Espionage Under the Microscope

November 2014 | Dark Reading
Marrying Monitoring With IAM

November 2014 | SC Media
Employees' Credentials from 221 of Fortune 500 Available Online

October 2014 | NBC News
Unwitting Workers Give Hackers Keys to Fortune 500 Firms' Networks

October 2014 | The Wall Street Journal
Fortune 500 Companies at Risk With Exposure of Employee Passwords

October 2014 | Mashable
Leaked Employee Passwords Open Up Fortune 500 Companies to Hackers

October 2014 | The Boston Globe
Employers Get a Warning on Net Use by Staffers

August 2014 | NPR
Big Data Firm Says it Can Link Snowden Data to Changed Terrorist Behavior

May 2014 | POLITICO Magazine
Snowden is the Kind of Guy I Used to Recruit in Russia

May 2014 | The Wall Street Journal
Report: Al-Qaeda Tries New Encryption Post-Snowden Leaks

May 2014 | Nextgov
Intel Firm Links Ukraine Energy Debt With Potential Cyber Assault

April 2014 | Defense One
How the Internet Could Have Predicted the Invasion of Ukraine

April 2014 | Defense One
Why Ukraine Has Already Lost The Cyber War, Too

April 2014 | PC Magazine
Understanding The Top 5 Mobile Banking Trojans

February 2014 | MIT Technology Review
Can Twitter Predict Major Events Such As Mass Protests?

January 2014 | Krebs on Security
New Clues in the Target Breach

November 2013 | Esquire
The Future is Recorded

October 2013 | Mashable
SEA Attacks Linked to Obama's Mentions of Syria

October 2013 | CIO
Dunkin’ Brands Uses Analytics to Predict Global Threats

October 2013 | International Policy Digest
Ethnographic Edge’s Crystal Ball

October 2013 | The Independent
What Happened When SEA Attempted a Cyber Attack on The Independent?

October 2013 | The Wall Street Journal
Anonymous Plans November Cyber Attacks

September 2013 | The Wall Street Journal
Data Shows No Link Between Syrian Electronic Army and Iran

September 2013 | Harvard Business Review
Vision Statement: Mapping the Cyberwar Battlefield

June 2013 | Fast Company
Silicon Valley and the Intelligence Agencies

May 2013 | Security Magazine
How to Secure the Global Enterprise

May 2013 | The Wall Street Journal
Big Data Lessons from Silicon Valley

May 2013 | The Washington Times
Hackers Sell Out and Go Corporate as Cyber Crime Becomes Shift Work

April 2013 | Business Insider
Thanks to Geniuses From MIT and Harvard, There Are Some Truly Innovative Boston Start-Ups

March 2013 | Business Insider
Now, You Can Predict the Future Just Like Nate Silver

January 2013 | The Wall Street Journal
Turning Our Data Sights Outward

January 2013 | Financial Times
Distilled Power of Start-Ups Challenges Big Incumbents

December 2012 | The Boston Globe
Is Boston Tops in Big Data? Depends on When You Ask

October 2012 | BreakingGov
Temporal Analytics: Turning Protest Noise into Intelligence

October 2012 | Washington Post
An Infographic Showing the Global Spike in Protests

October 2012 | Foreign Policy
10 Big Data Sites to Watch

October 2012 | NPR
Predicting the Future: Fantasy or a Good Algorithm?

July 2012 | VentureFizz
One of the Coolest Start-Ups – Recorded Future

February 2012 | The Boston Globe
Recorded Future: It's Like Google Meets Nostradamus

November 2011 | Wired Magazine
Crushing the Cost of Predicting the Future

November 2011 | Wired Magazine
The News Forecast

March 2011 | Business Insider
This Man Can Predict the Future

December 2010 | MIT Technology Review
See the Future With a Search

August 2010 | TechCrunch
TechCrunch Europe: Googling the Future

August 2010 | Gizmag
New Start-Up Uses Internet to Predict the Future

July 2010 | Wired Magazine
Exclusive: Google, CIA Invest in ‘Future’ of Web Monitoring

July 2010 | Gizmodo
CIA and Google’s Joint Investment Raising Eyebrows

May 2010 | Mashable
Google Invests in App That Predicts the Future

May 2010 | All Things Digital
Meet Google’s Secret Time Machine Investment