MENU
MENU
Blog
Careers
Contact
Support
Log In
Get Started
RESOURCES
Resources Overview
Get access to various resources from Recorded Future
Reports
Read our reports to keep up with the latest threat intelligence advice
Blog
Intelligence analysis, industry perspective, product updates, company news, and more
Videos
Watch our videos to see firsthand the power of threat intelligence
What Is Threat Intelligence?
Get an overview of threat intelligence with specific examples
Grader
Take this short survey to assess your threat intelligence maturity
White Papers
Read our white papers to keep up with the latest threat intelligence advice
Webinars
Watch live and on-demand webinars to hear from industry experts
Podcasts
Listen to our podcast to supercharge your threat intelligence knowledge
Cyber Daily
Join over 40,000 subscribers who get daily threat insights by email
The Threat Intelligence Handbook
Download our new book to learn everything about threat intelligence
PARTNERS
Recorded Future Express
Learn More
Overview
As a Recorded Future Connect Partner, you can deliver threat intelligence to your clients whenever and wherever they need it.
Partner Portal Log In
Partners
Value-Added Reseller
Technology Partners
Managed Security Service Providers
OEM
COMPANY
About
Clients
Events
Press
Careers
Contact
SOLUTIONS
BY ROLE
Incident Response
Security Leadership
Security Operations
Threat Analysis
Vulnerability Management
Public Sector Analyst
BY NEED
Brand Protection
Dark Web Monitoring
Threat Alerting
Alert Triage
Threat Intelligence Feeds
Threat Intelligence Platform
Third-Party Risk
Threat Hunting
PRODUCTS
Overview
Recorded Future’s unique technology collects and analyzes vast amounts of data to deliver relevant cyber threat insights in real time.
Portal
Direct access to all Recorded Future threat intelligence, including indicator lookups, advanced searches, and more.
Integrations
Real-time threat intelligence from Recorded Future is machine readable for frictionless integration with your existing security technologies.
Browser Extension
Our browser extension provides instant access to threat intelligence from any web-based resource.
Finished Intelligence
Human-generated research and analysis conducted by our team of experts, Insikt Group.
Services
Maximize the investment you’re making in threat intelligence by working with Recorded Future’s experienced professional services teams.
License Options
Three unique user licenses allow clients to access Recorded Future’s threat intelligence at the level that is right for them.
Press Mentions
October 2019 • Ars Technica
Rent-a-troll: Researchers pit disinformation farmers against each other
Read more
October 2019 • NBC News
Trolls for hire: Russia's freelance disinformation firms offer propaganda with a professional touch
Read more
September 2019 • Fortune
Disinformation for Hire: How Russian PR Firms Plant Stories for Companies in UK News Outlets, Social Media
Read more
September 2019 • Financial Times
Old messages, new memes: Beijing's propaganda playbook on the Hong Kong protests
Read more
August 2019 • SC Media
Research: Hacktivism activity and chatter has markedly dropped since 2016
Read more
July 2019 • SecurityWeek
Guildma Malware Expands Targets Beyond Brazil
Read more
June 2019 • The Irish Times
King Jong Un's cyber army raises cash for North Korea
Read more
June 2019 • The Guardian
Fishwrap' fake news campaign reccycles old news of terror attacks
Read more
June 2019 • The Daily Swig The Daily Swig
Critical browser flaws among scores of bugs fixed in latest Patch Tuesday
Read more
June 2019 • Verdict
"No smoking gun" but Huawei security threat too great to ignore, warns report
Read more
June 2019 • The Guardian
Huawei security threat derives from its sheer scale, says analysis
Read more
June 2019 • Tech Radar Pro
Microsoft warns users about email security
Read more
June 2019 • IT Pro
Fresh spam campaign targeting Microsoft Office with old malware
Read more
June 2019 • Help Net Security
Malware peddlers hit Office users with old but reliable exploit
Read more
June 2019 • Computing
Huawei a 'perfect storm of unintended consequences waiting to happen', claims researchers
Read more
May 2019 • CBR
One week; Four cybersecurity deals; $1.5 bilion spent: What's Bought What?
Read more
May 2019 • Data Breach Today
Sale of Recorded Future a highlight of Big Infosec M&A week
Read more
May 2019 • Infosecurity
Insight ventures partners to acquire Recorded Future
Read more
May 2019 • Help Net Security
Insight partners acquire Recorded Future for $780 Million
Read more
May 2019 • Castle Cove Investments
Insight partners acquire Recorded Future for $780 Million
Read more
May 2019 • Metro
The dark web 'is becoming an Amazon for crime' for millions
Read more
May 2019 • The Big Tech Question
Is Window's 7 safe?
Read more
May 2019 • NBC Boston
Inside the Dark Web: Here's How Easy It Is for Thieves to Buy Your Personal Info
Read more
May 2019 • SiliconANGLE
Microsoft offers security update to fix critical issue in older Windows systems
Read more
May 2019 • SC Magazine
Microsoft Sharepoint vulnerability spotted in the wild, likely being exploited
Read more
May 2019 • Dark Reading
Demystifying the Dark Web: What You Need to Know
Read more
May 2019 • CNN
Crippling ransomware attacks targeting US cities on the rise
Read more
May 2019 • WIRED
Feds Dismantled the Dark-Web Drug Trade—but It's Already Rebuilding
Read more
May 2019 • TechMeme
The dark web is tiny and unreliable: analysis of 55K onion domains on the Tor network finds only 8,400 had a live site, with many having poor up times
Read more
May 2019 • CyberScoop
How many dark web marketplaces actually exist? About 100.
Read more
May 2019 • GDPR Report
Wormable' bug could cause another WannaCry
Read more
May 2019 • Infosecurity
"Wormable" bug could enable another wannacry
Read more
May 2019 • Computer Buisness Review
Microsoft Credits NCSC for Critical Bug Find, Pushes Out Unusual Patch
Read more
May 2019 • Security Week
Hackers Add Security Software Removal to Banload Banking Malware
Read more
April 2019 • SC Magazine
Credential stuffing: Bigger and badder than ever
Read more
April 2019 • IDG Connect
Pirates of Brazil: An introduction to the Brazillian cyber underground
Read more
April 2019 • Daily Swig
Spain on the front line of election security ahead of EU-wide poll
Read more
April 2019 • Financial Times
What are the main security risks of using Huawei for 5G?
Read more
April 2019 • TechRepublic
How automated Dark Web marketplaces make credential stuffing attacks more profitable
Read more
April 2019 • ZD Net
An inside look at how credential stuffing operations work
Read more
April 2019 • Information Age
How ransomware continues to target businesses and what to do about it
Read more
April 2019 • Infosecurity
Microsoft Fixes Another Two Zero Days in Patch Avalanche
Read more
March 2019 • FX Street
Litecoin price analysis: LTC/USD test $125.00, more downside in store
Read more
March 2019 • The Express
Litecoin price news: What is the current value of Litecoin? Is LTC DEAD?
Read more
March 2019 • The Register
Exploit kit development has gone to sh$t… ever since Adobe Flash was kicked to the curb
Read more
March 2019 • Security Week
The Top Vulnerabilities Exploited by Cybercriminals
Read more
March 2019 • Security Brief Europe
New research finds China tampering with public vulnerability data
Read more
March 2019 • The Express
Cryptocurrency dark web: Next most popular cryptocurrency among cyber criminals REVEALED
Read more
March 2019 • The Register
China ALTERED its public vuln database to conceal spy agency tinkering – research
Read more
March 2019 • The Times
Bitcoin, Ethereum, ripple XRP: a guide to cryptocurrencies
Read more
March 2019 • Security Week
New North Korea-linked Cyberattacks Target Financial Institutions
Read more
March 2019 • Infosecurity
China Backdated Bug Disclosures to Hide State Hacking: Report
Read more
March 2019 • V3
China accused of taking the best submissions to national vulnerability database for cyber espionage – then concealing the evidence
Read more
March 2019 • SC Media
Chinese Ministry of State Security caught manipulating critical CVE data
Read more
March 2019 • Teiss
China altering its vulnerability data: why it matters
Read more
March 2019 • Information Security Buzz
2018 Ransomware Trends (YouTube)
Read more
March 2019 • Verdict Encrypt
Drowning in Data: Transforming Threat Intelligence for the Better
Read more
March 2019 • Information Security Buzz
2018 Ransomware Trends
Read more
March 2019 • IDG Connect
North Korea pursues cryptocurrency exchanges in South Korea
Read more
March 2019 • The Telegraph
North Korea may have made as much as $200 million from Bitcoin, according to expert
Read more
March 2019 • ASSOCIATED PRESS
Facebook left millions of passwords readable by employees
Read more
March 2019 • KREBS ON SECURITY
Patch Tuesday, March 2019 Edition
Read more
March 2019 • CSO
What are the new China Cybersecurity Law provisions? And how CISOs should respond
Read more
March 2019 • DARK READING
Microsoft Office Dominates Most Exploited List
Read more
March 2019 • THE HILL
Researchers: Chinese influence operations seek to elevate China's image, not sow discord
Read more
March 2019 • SC MAGAZINE
Report reveals how China leverages social media to influence U.S.
Read more
February 2019 • V3
Counterfeit code-signing certificates enabling hackers to hide malware being sold by cyber criminals
Read more
February 2019 • Security Week
Use of Fake Code Signing Certificates in Malware Surges
Read more
February 2019 • Help Net Security
Counterfeit digital certificates for sale on underground forums
Read more
February 2019 • Security Brief Europe
Rumours fly about who was behind the PyeongChang Olympics hack
Read more
February 2019 • The Block
Winter shows Litecoin as second most dominant coin on the dark web
Read more
February 2019 • Computer Weekly
Atos investigates breach linked to Winter Olympics cyber attack
Read more
February 2019 • Security Week
Litecoin, Dash to Dethrone Bitcoin on Dark Web: Report
Read more
February 2019 • Tech Radar Pro
Bitcoin’s slipping as dark web looks to crown a new king of the cryptocurrencies
Read more
February 2019 • Silicon republic
Winter Olympics cyber attack is shrouded in mystery
Read more
February 2019 • CYBERSCOOP
Hack of billion-dollar Norwegian firm is tied to Chinese espionage group APT10
Read more
February 2019 • ASSOCIATED PRESS
Experts: US anti-Huawei campaign likely exaggerated
Read more
February 2019 • CRN
WATCH: Recorded Future Exec On New Channel-Friendly Security Software That Works In Any Web-Based Application
Read more
February 2019 • GCN
5 steps for a successful public-private cyber crime fighting partnership
Read more
February 2019 • MIT TECH REVIEW
A Norwegian cloud computing firm has been hit by a Chinese cyberattack
Read more
February 2019 • NEW YORK TIMES
Chinese and Iranian Hackers Renew Their Attacks on U.S. Companies
Read more
February 2019 • REUTERS
China hacked Norway's Visma to steal client secrets - investigators
Read more
February 2019 • ZDNET
China's cybersecurity law update lets state agencies 'pen-test' local companies
Read more
February 2019 • SECURITY AFFAIRS
Security firm Recorded Future discovered the hacker behind Collection #1
Read more
January 2019 • Digitalisation World
Recorded Future launches Fusion
Read more
January 2019 • Business Insider UK
New evidence reportedly puts North Korean hackers behind a list of high-stakes bitcoin heists
Read more
January 2019 • The Independent
North Korea is stealing bitcoin and the threat to cryptocurrency investors is growing, experts warn
Read more
January 2019 • World Finance
North Korean hackers behind South Korean cryptocurrency attacks, say researchers
Read more
January 2019 • Computer Weekly
North Korean hackers tied to cryptocurrency attacks in South Korea
Read more
January 2019 • International Business Times
Lazarus: North Korean hackers linked to Sony hack were behind cryptocurrency attacks in South Korea
Read more
January 2019 • IDG Connect
Could Huawei smartphone deal fail spell full-blown Sino-US trade war?
Read more
January 2019 • Security Week
North Korean Hackers Prep Attacks Against Cryptocurrency Exchanges: Report
Read more
January 2019 • Info security buzz
Vendors Rush To Patch Meltdown And Spectre Vulnerabilities
Read more
January 2019 • SC Media UK
Why are cyber-criminals dumping Bitcoin
Read more
January 2019 • SC Media UK
Meltdown and Spectre – vulnerabilities to watch (and fix)
Read more
January 2019 • ASSOCIATED PRESS
Fewer affected in Marriott hack, but passports a red flag
Read more
January 2019 • CNBC
New research shows how Iranian hackers have collaborated to become one of the world’s most fearsome hacking forces
Read more
January 2019 • CHANNEL BUZZ
Recorded Future introduces new module to provide dynamic analysis of risks incurred from third-party relationships
Read more
January 2019 • KREBS ON SECURITY
Patch Tuesday, January 2019 Edition
Read more
January 2019 • SECURITY WEEK
The Rise and Fall of Ashiyane - Iran's Foremost Hacker Forum
Read more
January 2019 • WASHINGTON POST
Marriott: Hackers accessed more than 5 million passport numbers during November’s massive data breach
Read more
January 2019 • SECURITY WEEK
Recorded Future Adds Third-Party Risk to Threat Intelligence Platform
Read more
January 2019 • WSJ CYBERSECURITY PRO
Cyber Daily: Passport Thieves; Power Grid Hackers
Read more
December 2018 • Security Week
Industry Reactions to U.S. Charging APT10 Hackers: Feedback Friday
Read more
December 2018 • IT Pro Portal
Back to the future for 2019
Read more
December 2018 • Financial Times
Who is the Chinese group blamed for cyber-attacks on the west?
Read more
December 2018 • Infosecurity
Microsoft and Adobe Patch 100+ Bugs in December
Read more
December 2018 • The Daily Swig
State-backed hackers switch to inferior tactics to avoid being fingered for attacks
Read more
December 2018 • Forbes
Marriott’s 500 Million Hack Blamed On China - Should You Believe It?
Read more
December 2018 • The Telegraph
Former NSA official urges Britain to block Huawei technology over ‘legitimate security concerns’
Read more
December 2018 • Associated Press
Voter records offered for sale month ahead of elections
Read more
December 2018 • Verdict Encrypt
Tessa88 unmasked
Read more
December 2018 • CBS Radio
New York Times Reports World's Largest Companies Expose User Data
Read more
December 2018 • New York Times
China’s ‘Belt and Road’ Plan in Pakistan Takes a Military Turn
Read more
December 2018 • CNN
US charges Chinese hackers in global scheme targeting business and military
Read more
December 2018 • Wall Street Journal
Marriott’s Starwood Missed Chance to Detect Huge Data Breach Years Earlier, Cybersecurity Specialists Say
Read more
November 2018 • Security Week
Chinese Hackers Target UK Engineering Company: Report
Read more
December 2018 • Wall Street Journal
To Fight This Generation of Hackers, Companies Take a Cue from Spies
Read more
November 2018 • Information Security Buzz
Internet Traffic Hijack Disrupts Google Services
Read more
November 2018 • The Express
Midterm elections 2018: Russia is targeting US voters, warns FBI – Facebook removes pages
Read more
November 2018 • SC Magazine UK
Chinese hackers using Russian tactics to attack UK firms
Read more
November 2018 • The Daily Swig
Spoiling the ballot: Cyber fears cloud US midterm elections
Read more
November 2018 • Daily Mail
Russia seen adopting new tactics in U.S. election interference efforts
Read more
November 2018 • IDG Connect
An introduction to the Russian-language underground
Read more
November 2018 • Verdict
US midterms: Efforts of Russian “right trolls” ramped up in run-up to election
Read more
November 2018 • FOREIGN POLICY
The Other War in Yemen—for Control of the Country’s Internet
Read more
November 2018 • AXIOS
How Yemen's civil war went cyber
Read more
November 2018 • REUTERS
Russia seen adopting new tactics in U.S. election interference efforts
Read more
November 2018 • THE HILL
Security firm says identity of renowned hacker is Russian national
Read more
November 2018 • SC MAGAZIN
Suspected TEMP.Periscope phishing campaign adopts Russian APT techniques
Read more
November 2018 • THREATPOST
Microsoft Patches Zero-Day Bug in Win7, Server 2008 and 2008 R2
Read more
November 2018 • ZDNET
Cyber-security firm doxxes hacker who sold MySpace and Dropbox databases in 2016
Read more
October 2018 • Data Breach Today
Crypto-Locking Kraken Ransomware Looms Larger
Read more
October 2018 • Verdict
North Korea cryptocurrency scam raised for Kim regime
Read more
October 2018 • Bank Info Security
Crypto-Locking Kraken Ransomware Looms Larger
Read more
October 2018 • The Telegraph
LinkedIn becomes social media of choice for North Korea’s elite
Read more
October 2018 • SC Magazine
North Korea regime using and exploiting cryptocurrencies
Read more
October 2018 • Global Defence Magazine
Drone planes for sale: Military documents on the dark web
Read more
October 2018 • The Amed Post
Chinese hackers are driven by patriotism, while Russians are driven by greed
Read more
October 2018 • The Register
China’s clampdown on Tor pushes its hackers into foreign backyards
Read more
October 2018 • FORBES
Cybersecurity Needs Women: Here's Why
Read more
October 2018 • DARK READING
Kraken Resurfaces From the Deep Web
Read more
October 2018 • FOX NEWS
Chinese hackers are driven by patriotism, while Russians are driven by greed
Read more
October 2018 • FOREIGN POLICY
Chinese Spy Ops, Something Old, Something New
Read more
October 2018 • NEWSWEEK
North Korea Regime is Making Money from Cryptocurrency Scam that Offered Users Ownership of Ships: Report
Read more
October 2018 • ZDNET
A deep dive into the forces driving Russian and Chinese hacker forums
Read more
October 2018 • WASHINGTON POST
The Cybersecurity 202: Trump's refusal to give up his iPhone sets dangerous precedent
Read more
September 2018 • Verdict Encrypt
Drone Plans for Sale: How White Hat Hackers Infiltrated a Criminal Gang Selling Military Documents
Read more
September 2018 • CSO Online
What is a botnet? And why they aren't going away anytime soon
Read more
September 2018 • Verdict
North Korea backed cyber-attacks appear to be funding Kim Jong-Un regime
Read more
September 2018 • Dark Reading
The 'Opsec Fail' That Helped Unmask a North Korean State Hacker
Read more
September 2018 • IT Tool Box
Researcher Reveals Microsoft Windows “Zero Day” Vulnerability
Read more
September 2018 • Newsweek
China Uses Cyberespionage to Gain Military Advantage
Read more
September 2018 • New York Times
Inside Facebook’s Election ‘War Room’
Read more
September 2018 • Maclean’s
Canada is plagued by Bitcoin ransoms—and there’s no help in sight
Read more
September 2018 • The Parallax
Triaging modern medicine’s cybersecurity issues
Read more
September 2018 • POLITICO
What’s next for data breach legislation?
Read more
September 2018 • Wall Street Journal
How Dirty Money Disappears Into the Black Hole of Cryptocurrency
Read more
August 2018 • Associated Press
US braces for possible cyber attacks after Iran sanctions
Read more
August 2018 • Fast Company
Hackers Beware: These Stealthy Cybersecurity Hunters Speak Your Slang
Read more
July 2018 • The Register
Russia's National Vulnerability Database Is a Bit Like the Soviet Union — Sparse and Slow
Read more
August 2018 • Reuters
Chinese Hackers Targeted US Firms, Government After Trade Mission: Researchers
Read more
July 2018 • The Wall Street Journal
Stolen US Military Drone Documents Found for Sale on Dark Web, Researchers Say
Read more
June 2018 • eWEEK
Recorded Future: Product Overview and Insight
Read more
July 2018 • CNN
US Reaper Drone Data Leaked on Dark Web, Researchers Say
Read more
June 2018 • Fortune
North Korea Uses Microsoft and Apple Technology for Cyberattacks, Researchers Say
Read more
June 2018 • Fox News
North Korea's Leadership Loves iPhones, Report Says
Read more
June 2018 • Washington Post
North Korean Elites Get the Latest Tech – Including iPhone X – Despite Sanctions, Report Finds
Read more
May 2018 • Daily Mail
Iran Likely to Launch Cyberattacks on Western Businesses
Read more
May 2018 • WIRED
The Iran Nuclear Deal’s Unraveling Raises Fears of Cyberattacks
Read more
April 2018 • Forbes
Even North Korea's Elites Are Ditching Facebook
Read more
April 2018 • Reuters
Croatian Police Arrest Suspect Behind Global Cyber Attack Platform
Read more
April 2018 • Financial Times
North Korea Elite Drop Western Websites to Avoid Online Scrutiny
Read more
April 2018 • SC Media
Mirai Variant That Struck Financial Institutions in January Detailed
Read more
April 2018 • CRN
Recorded Future Turns to the Channel to Help Build Integrations With Other Vendors
Read more
March 2018 • New York Times
A Cyberattack Hobbles Atlanta, and Security Experts Shudder
Read more
April 2018 • Infosecurity Magazine
Echoes of Mirai: New IoT Botnet Targets Financial Firms
Read more
March 2018 • Financial Times
China Hackers Ordered to Report Software Holes to Spy Agency
Read more
February 2018 • ZDNet
Hackers Are Selling Legitimate Code-Signing Certificates to Evade Malware Detection
Read more
March 2018 • The Telegraph
North Korea May Have Made as Much as $200 Million From Bitcoin
Read more
February 2018 • Ars Technica
One-Stop Counterfeit Certificate Shops for All Your Malware-Signing Needs
Read more
February 2018 • Fortune
Litecoin Is Now a Surprise Favorite of Criminals Tired of Bitcoin
Read more
February 2018 • Bloomberg
Criminals Are Ditching Bitcoin for Litecoin and Dash, Study Says
Read more
January 2018 • ChannelBuzz.ca
Recorded Future Adds Fusion End-to-End Threat Intelligence Solution
Read more
January 2018 • BetaNews
New Solution Delivers Universal Threat Intelligence
Read more
November 2017 • Dark Reading
Recorded Future Named Top Threat Intelligence Vendor to Watch in 2018
Read more
October 2017 • Fortune
Exclusive: This Cybersecurity Startup Raised $25M to Expand Dark Web Intel Service
Read more
October 2017 • Bloomberg Businessweek
The U.S. Lags Behind China in Spotting Cyberthreats
Read more
October 2017 • Fortune
A Hacker's Tool Kit
Read more
September 2017 • CNBC
Bitcoin 'Mining': A New Way for North Korea to Generate Funds for the Regime
Read more
September 2017 • Gizmodo
Hackers Have Already Started to Weaponize Artificial Intelligence
Read more
August 2017 • Fortune
Why the Honor Code Among Hackers Has Broken Down
Read more
August 2017 • Infosecurity Magazine
Records Leaked for 25 Footballers Using Banned Substances in 2010 World Cup
Read more
August 2017 • Washington Post
New Zealand Denies Visas to North Korean Academics to Attend Conference
Read more
July 2017 • International Business Times
Is Kim Jong-Un on World of Tanks? The Internet Habits of North Korea's Elite Revealed
Read more
July 2017 • BBC
Hiding Out Among the Net's Criminal Class
Read more
July 2017 • Washington Post
Not So Isolated: North Korea's Elite Uses Gmail, Facebook, and iTunes
Read more
July 2017 • The Wall Street Journal
GOP Seeks to Close Federal Election Agency
Read more
July 2017 • Threatpost
Telegram-Controlled Hacking Tool Targets SQL Injection at Scale
Read more
July 2017 • Dark Reading
New SQL Injection Tool Makes Attacks Possible From a Smartphone
Read more
July 2017 • SecurityWeek
SQLi Vulnerability Scanner Available on Hacking Forum at $500
Read more
July 2017 • SC Media
SQL Vulnerability Scanner 'Katyusha' Operable via Telegram App
Read more
June 2017 • Dark Reading
75% of Vulns Shared Online Before NVD Publication
Read more
June 2017 • ZDNet
The Dark Web Is the Place to Go to Find Bugs Before Public Disclosure
Read more
May 2017 • Infosecurity Magazine
German Threat Actor Spreads Houdini Worm on Pastebin
Read more
May 2017 • Dark Reading
APT3 Threat Group a Contractor for Chinese Intelligence Agency
Read more
May 2017 • SC Media UK
Russian Fatboy Ransomware-as-a-Service Offers Customer Support Over Jabber
Read more
May 2017 • New York Times
Ransomware’s Aftershocks Feared as US Warns of Complexity
Read more
May 2017 • The Register
How Do Ransomware Scum Decide What to Charge You? The Big Mac Index
Read more
May 2017 • Dark Reading
New Free Shodan Tool Roots Out RATs
Read more
May 2017 • ZDNet
Rich? This Ransomware Will Charge You More to Unlock Your Encrypted Files
Read more
April 2017 • Infosecurity Magazine
Shadow Brokers Attack Tools Light Up Chinese and Russian Darknet
Read more
May 2017 • SecurityWeek
Malware Hunter' Helps Researchers Find C&C Servers
Read more
April 2017 • CyberScoop
Leaked NSA Hacking Tools Are a Hit on the Dark Web
Read more
April 2017 • International Business Times
This New Dark Web Ransomware-as-a-Service Is Customized So Any Script Kiddie Can Launch Attacks
Read more
April 2017 • BankInfoSecurity
Want to Get Into Ransomware? This Kit Costs Just $175
Read more
April 2017 • Dark Reading
Advanced, Low-Cost Ransomware Tools on the Rise
Read more
April 2017 • SecurityWeek
Karmen Ransomware Deletes Decryptor If Sandbox Is Detected
Read more
April 2017 • BleepingComputer
New Karmen Ransomware-as-a-Service Advertised on Hacking Forums
Read more
April 2017 • CyberScoop
Cheap and Effective Ransomware-as-a-Service Introduced in Russian Underground
Read more
April 2017 • Security Affairs
Karmen Ransomware, a Cheap RaaS Service That Implements Anti-Analysis Features
Read more
April 2017 • The Hacker News
Russian Hacker Selling Cheap Ransomware-as-a-Service on Dark Web
Read more
April 2017 • PCWorld
At $175, This Ransomware Service Is a Boon to Cyber Criminals
Read more
April 2017 • Threatpost
Low-Cost Ransomware Service Discovered
Read more
April 2017 • Infosecurity Magazine
Karmen Ransomware: User-Friendly, Sandbox-Averse
Read more
April 2017 • SC Media
Karmen Ransomware Seduces Novice Cybercriminals With Affordability, Ease of Use
Read more
April 2017 • The Register
Profit With Just One Infection! Crook Sells Ransomware for $175
Read more
April 2017 • ZDNet
A Russian Hacker Has Created His Own 'Starter Pack' Ransomware Service
Read more
April 2017 • International Business Times
What Happens to Your Data Once It Is on the Dark Web?
Read more
April 2017 • Fortune
Russian Hackers Are Afraid to Travel After US Arrests Spam King
Read more
February 2017 • International Business Times
Russian Hacker Rasputin Hacked Over 60 US Government Agencies and International Universities
Read more
March 2017 • Momentum Partners
Momentum Partners Releases Its 2nd Annual Watch List After the 2017 RSA Conference
Read more
February 2017 • The Hill
Russian-Speaking Hacker Breached HUD, Security Firm Says
Read more
February 2017 • Fortune
Hacker Breached Dozens of Universities and Government Agencies, Report Says
Read more
February 2017 • Computerworld
Hacker Breached 63 Universities and Government Agencies
Read more
February 2017 • ZDNet
Recorded Future Expands Platform to Scan Every Source on the Web for Digital Threats
Read more
January 2017 • SC Media
Arenas Entertainment Hit With Ransomware Demand
Read more
January 2017 • IDG Connect
Will a Cyber War DéTente Result in Businesses Facing More Cyber Crime?
Read more
January 2017 • CSO Online
Ransomware Took in $1 Billion in 2016
Read more
December 2016 • BBC
US Hacking Claims: Russia Says 'Indecent' Without Evidence
Read more
December 2016 • Reuters
US Election Agency Breached by Hackers After November Vote
Read more
December 2016 • TechCrunch
The Government Body That Oversees the Security of Voting Systems Was Itself Hacked
Read more
December 2016 • The Huffington Post
Hackers Breached US Election Agency After Vote, According to Security Firm
Read more
December 2016 • The Register
US Voting Machine Certification Agency Probes Potential Hack
Read more
December 2016 • BuzzFeed
US Agency That Certifies Voting Machines Was Hacked, Firm Says
Read more
December 2016 • CIO
Know Your (Cyber) Enemy
Read more
December 2016 • SC Media
Hackers Hide Base64-Encoded PowerShell Scripts on Pastebin
Read more
December 2016 • Krebs on Security
New Critical Fixes for Flash, MS Windows
Read more
December 2016 • Forbes
2016 Was Another Huge Year For Adobe Flash Attacks
Read more
December 2016 • Infosecurity Magazine
On the Seventh Day of Christmas, the Industry Predicted ... More Mention of AI
Read more
December 2016 • SC Media
Q&A With Andrei Barysevich
Read more
December 2016 • The Register
Need Xmas Ideas? Try CVE-2015-7645, a Flash Gift That Keeps on Giving
Read more
December 2016 • TechTarget
Exploit Kit Delivered via Malvertising Targets Unpatched Systems
Read more
December 2016 • InfoWorld
Flash Player Remains Target of Choice for Exploit Kits
Read more
December 2016 • Graham Cluley
Adobe Flash Responsible for 6 of the Top 10 Bugs Used by Exploit Kits in 2016
Read more
December 2016 • Dark Reading
Adobe Flash Flaws Dominate Exploit Kits In 2016
Read more
December 2016 • Threatpost
Flash Exploit Found in 7 Exploit Kits
Read more
December 2016 • NBC News
Who's Next, After San Francisco's Public Transit System Got Hacked?
Read more
December 2016 • SecurityWeek
Flash Player Remains Main Target of Exploit Kits: Report
Read more
December 2016 • IDG Connect
Does Hacking Pay?
Read more
November 2016 • SC Media
Most Cyber Criminals Earn $1K to $3K a Month, Report
Read more
November 2016 • Network World
How to Dodge Black Friday and Cyber Monday Shopping Hackers
Read more
November 2016 • CSO Online
Report: Most Cyber Criminals Earn $1,000 to $3,000 a Month
Read more
November 2016 • SC Media
Cybercriminals, as Usual, Make the Naughty List
Read more
November 2016 • The Christian Science Monitor
Why Election Day Hacking Risks Are Overblown
Read more
November 2016 • Inc.
Making Sense of a Trump Presidency
Read more
October 2016 • Motherboard
How Hackers Plant False Flags to Hide Their Real Identities
Read more
October 2016 • WIRED
Is Cyber Security Broken? Building Walls Won't Prevent Hacks, Predicting the Future Will
Read more
October 2016 • CSO Online
Q&A: The Myths and Realities of Hacking an Election
Read more
September 2016 • Dark Reading
Decrypting the Dark Web: Patterns Inside Hacker Forum Activity
Read more
September 2016 • Motherboard
This Cyber Security Firm Maps Hackers' Lives by the Clues They Leave Online
Read more
August 2016 • SC Media
Voter Database Hack in Illinois by Foreign Intruder Compromises Info of 200K
Read more
August 2016 • Cybersecurity Ventures
Meet the Hot Cybersecurity Companies to Watch in 2016
Read more
June 2016 • InfoWorld
Hack the Hackers: Eavesdrop for Intel on Emerging Threats
Read more
June 2016 • IT Business Edge
Recorded Future Extends Reach of Security Intelligence Service
Read more
June 2016 • ZDNet
Recorded Future Partners With Top Cyber Security Firms in Threat Analysis Boost
Read more
June 2016 • Network World
Recorded Future Aligns With Other Threat Intelligence Vendors
Read more
May 2016 • Infosecurity Magazine
Proof of Concepts Soared 200% in 2015
Read more
May 2016 • Dark Reading
Proof-of-Concept Exploit Sharing Is on the Rise
Read more
April 2016 • The Wall Street Journal
Twitter and Islamic State Deadlock on Social Media Battlefield
Read more
May 2016 • The Register
Miscreants Tripled Output of Proof of Concept Exploits in 2015
Read more
April 2016 • Reuters
Recorded Future Announces Integration With Palo Alto Networks
Read more
March 2016 • InfoWorld
Ransomware Targets Flash and Silverlight Vulnerabilities
Read more
March 2016 • The Wall Street Journal
Healthcare CIOs, Facing Ransomware Threat, Share Security Best Practices
Read more
March 2016 • Dark Reading
Here Are 4 Vulnerabilities Ransomware Attacks Are Exploiting Now
Read more
February 2016 • Hindustan Times
Cyber Attacks a Legitimate Worry Ahead of India-Pak Asia Cup Clash
Read more
March 2016 • The Register
BlackEnergy Malware Activity Spiked in Runup to Ukraine Power Grid Takedown
Read more
February 2016 • The Times of India
Indian Websites More Prone to Pakistan-Based Hacker Attacks on Big Events
Read more
February 2016 • The Register
Cricket Can Get Nasty: India vs. Pakistan Rivalry Boils Over Into Cyber War
Read more
February 2016 • SC Media
India and Pakistan Tensions Go Online
Read more
February 2016 • CSO Online
Does Attribution Matter to Security Leaders?
Read more
December 2015 • CNBC
Cyber Attackers Using Bitcoin, Despite Traceability
Read more
January 2016 • The Christian Science Monitor
Iran-Saudi Arabia Row Adds Fuel for Hackers on Both Sides
Read more
December 2015 • Threatpost
Bitcoin Extortionist Copycats on the Rise, Experts Say
Read more
December 2015 • Softpedia
Unknown Copycat Using Armada Collective Name for DDoS-for-Bitcoin Extortions
Read more
December 2015 • SecurityWeek
DD4BC, Armada Collective Inspire Cyber Extortion Copycats
Read more
December 2015 • Dark Reading
Cyber Extortion, DDoS-for-Bitcoin Campaigns Rise
Read more
November 2015 • eWEEK
Analysis Finds Flash Top Exploit Target as Adobe Fixes Latest Flaws
Read more
November 2015 • Krebs on Security
Critical Fixes for Windows, Adobe Flash Player
Read more
November 2015 • PCWorld
No Surprise Here: Adobe's Flash Is a Hacker's Favorite Target
Read more
November 2015 • Network World
8 of Top 10 Vulnerabilities Used by Exploit Kits Target Adobe Flash Player
Read more
November 2015 • SC Media
Patch Tuesday: Adobe Addresses 17 Critical Vulnerabilities in Flash
Read more
November 2015 • SecurityWeek
Flash Flaws Most Common in Exploit Kits: Report
Read more
October 2015 • The Times
Hackers' Threat to Dump 1.2M Stolen TalkTalk Details Online
Read more
October 2015 • The Register
Iranian VXers Unleash RATs to Bite Popular Android Devices
Read more
October 2015 • SC Media
Iranian Hackers Show Growing Interest in Android RATs
Read more
October 2015 • CSO Online
Iranian Hackers Get Tech Support on Forums
Read more
September 2015 • eWEEK
Sloppy Remote Access Trojan Operators Show Up in Internet Scans
Read more
October 2015 • TechCrunch
http://techcrunch.com/2015/10/23/connected-car-security-separating-fear-from-fact/
Read more
September 2015 • Dark Reading
New Tactic Finds RAT Operators Fast
Read more
September 2015 • SecurityWeek
Russian Hackers Target Industrial Control Systems: US Intel Chief
Read more
September 2015 • EE Times
SCADA Vulnerability on the Rise
Read more
September 2015 • InfoWorld
Reports of Attacks on the Department of Energy Raise Alarms
Read more
September 2015 • SecurityWeek
ICS Flaw Disclosures at High Levels Since Stuxnet Attack: Report
Read more
August 2015 • CSO Online
New IP Address Blacklist Based on Web Chatter
Read more
August 2015 • The Register
Blacklists Miss 90% of Malware Blogged IP Love
Read more
July 2015 • CSO Online
How to Surf the Dark Web for Fun and Profit
Read more
June 2015 • TechTarget
US Government Passwords Stolen and Leaked Around the Web
Read more
July 2015 • The Christian Science Monitor
Opinion: The Value of Unmasking Tor's Dark Side
Read more
June 2015 • International Business Times
Iran and Saudi Arabia Heading Toward a Cyber War?
Read more
June 2015 • eSecurity Planet
US Government Login Credentials Found Online
Read more
June 2015 • Washington Times
The US Government Hasn't Learned How to Keep Sensitive Data Secret
Read more
June 2015 • The Federal Drive
The Federal Drive: Agency Logins on the Open Web
Read more
June 2015 • Fox News
Iran and Saudi Arabia Edge Towards Cyber War, Study Says
Read more
June 2015 • VICE
There's Evidence the 'Yemen Cyber Army' Is Actually Iranian
Read more
June 2015 • Washington Post
Theft of Saudi Documents Suggests an Iranian Hack
Read more
June 2015 • CIO TODAY
Tech Company Finds Leaked US Government Logins, Passwords Online
Read more
June 2015 • Naked Security
Stolen Logins for US Government Agencies Found All Over the Web
Read more
June 2015 • Federal Times
Government Logins Widely Available Online
Read more
June 2015 • BBC News
US Government Logins and Passwords Leaked Online
Read more
June 2015 • SC Media
Study: Leaked Credentials on Pastebin, Similar Sites, Linked to 47 Government Agencies
Read more
June 2015 • Threatpost
Stolen Government Agency Passwords Easy to Find Online
Read more
June 2015 • Business Insider
Login Credentials From 47 Government Agencies Discovered on the Internet
Read more
June 2015 • Infosecurity Magazine
Stolen Government Logins Available All Over the Web
Read more
June 2015 • ZDNet
Stolen US Government Passwords Leaked Across Web
Read more
June 2015 • Tom's Hardware
Report: Security of US Agencies in Dire State, Employee Logins Widely Leaked
Read more
June 2015 • FCW
Report: 47 Agencies Face Possible Login Credential Exposure
Read more
June 2015 • WRAL TechWire
CIA-Backed Tech Company Finds Stolen Government Logins All Over Web
Read more
June 2015 • Associated Press
Tech Company Finds Stolen Government Logins All Over Web
Read more
June 2015 • The Hill
Government Passwords Scattered Across the Web, Study Finds
Read more
June 2015 • Boston Business Journal
Cambridge Firm Says Recent Breaches Left Dozens of Federal Agencies Open to Espionage, Theft
Read more
June 2015 • CBS News
Report: EMails, Passwords From 47 Government Agencies Leaked Online
Read more
June 2015 • The Register
Login Creds for US Agencies Found Scrawled on the Web's Toilet Walls
Read more
June 2015 • Wired Magazine
Hundreds of .Gov Credentials Found in Public Hacker Dumps
Read more
June 2015 • Business Insider
Computers Can Now Tell Between Real Breaking News and Internet Trolls Trying to Dupe Us
Read more
June 2015 • The Wall Street Journal
Breached Network’s Security Is Criticized
Read more
May 2015 • Business Insider
Lizard Squad: Original Pranksters
Read more
April 2015 • Beyond Search
Recorded Future: The Threat Detection Leader
Read more
May 2015 • Business Insider
Inside the Company That Can Predict the Future by Analyzing the Web
Read more
April 2015 • VICE
Small-Time Hackers Can Be Deanonymized Even When Using Tor
Read more
April 2015 • Xconomy
Diving Deeper Into Cyber Security, Recorded Future Reels in $12M
Read more
April 2015 • BostInno
Recorded Future Has Raised $12M for its Cyber Threat Web Crawling Service
Read more
April 2015 • The Christian Science Monitor
Opinion: Threat Intelligence is the Judo Move Needed to Take Down Hackers
Read more
February 2015 • Svenska Dagbladet
Explosive Increase in Saudi Tributes to the Islamic State
Read more
February 2015 • VICE
The Closest Thing to a Map of the Dark Net: Pastebin
Read more
February 2015 • Sky News
More Twitter Activity Than Ever Over IS
Read more
February 2015 • SC Media
SC Lab Approved: Recorded Future Cyber
Read more
December 2014 • eWEEK
Network Defenders Have About a Week to Patch Flaw, Study Finds
Read more
January 2015 • The Wall Street Journal
An Optimistic Lens on Cyber Security
Read more
November 2014 • eWEEK
Cyber Threats Ascribed to Russia Crafted to Hunt Specific Data
Read more
November 2014 • Dark Reading
Russian Cyber Espionage Under the Microscope
Read more
November 2014 • SC Media
Employees' Credentials from 221 of Fortune 500 Available Online
Read more
November 2014 • Dark Reading
Marrying Monitoring With IAM
Read more
October 2014 • NBC News
Unwitting Workers Give Hackers Keys to Fortune 500 Firms' Networks
Read more
October 2014 • Mashable
Leaked Employee Passwords Open Up Fortune 500 Companies to Hackers
Read more
October 2014 • The Wall Street Journal
Fortune 500 Companies at Risk With Exposure of Employee Passwords
Read more
October 2014 • The Boston Globe
Employers Get a Warning on Net Use by Staffers
Read more
May 2014 • POLITICO Magazine
Snowden is the Kind of Guy I Used to Recruit in Russia
Read more
August 2014 • NPR
Big Data Firm Says it Can Link Snowden Data to Changed Terrorist Behavior
Read more
May 2014 • The Wall Street Journal
Report: Al-Qaeda Tries New Encryption Post-Snowden Leaks
Read more
April 2014 • Defense One
How the Internet Could Have Predicted the Invasion of Ukraine
Read more
May 2014 • Nextgov
Intel Firm Links Ukraine Energy Debt With Potential Cyber Assault
Read more
April 2014 • Defense One
Why Ukraine Has Already Lost The Cyber War, Too
Read more
February 2014 • MIT Technology Review
Can Twitter Predict Major Events Such As Mass Protests?
Read more
April 2014 • PC Magazine
Understanding The Top 5 Mobile Banking Trojans
Read more
November 2013 • Esquire
The Future is Recorded
Read more
January 2014 • Krebs on Security
New Clues in the Target Breach
Read more
October 2013 • Mashable
SEA Attacks Linked to Obama's Mentions of Syria
Read more
October 2013 • CIO
Dunkin’ Brands Uses Analytics to Predict Global Threats
Read more
October 2013 • The Independent
What Happened When SEA Attempted a Cyber Attack on The Independent?
Read more
October 2013 • International Policy Digest
Ethnographic Edge’s Crystal Ball
Read more
September 2013 • The Wall Street Journal
Data Shows No Link Between Syrian Electronic Army and Iran
Read more
October 2013 • The Wall Street Journal
Anonymous Plans November Cyber Attacks
Read more
September 2013 • Harvard Business Review
Vision Statement: Mapping the Cyberwar Battlefield
Read more
May 2013 • Security Magazine
How to Secure the Global Enterprise
Read more
June 2013 • Fast Company
Silicon Valley and the Intelligence Agencies
Read more
May 2013 • The Wall Street Journal
Big Data Lessons from Silicon Valley
Read more
May 2013 • The Washington Times
Hackers Sell Out and Go Corporate as Cyber Crime Becomes Shift Work
Read more
March 2013 • Business Insider
Now, You Can Predict the Future Just Like Nate Silver
Read more
April 2013 • Business Insider
Thanks to Geniuses From MIT and Harvard, There Are Some Truly Innovative Boston Start-Ups
Read more
January 2013 • The Wall Street Journal
Turning Our Data Sights Outward
Read more
December 2012 • The Boston Globe
Is Boston Tops in Big Data? Depends on When You Ask
Read more
January 2013 • Financial Times
Distilled Power of Start-Ups Challenges Big Incumbents
Read more
October 2012 • BreakingGov
Temporal Analytics: Turning Protest Noise into Intelligence
Read more
October 2012 • Foreign Policy
10 Big Data Sites to Watch
Read more
October 2012 • Washington Post
An Infographic Showing the Global Spike in Protests
Read more
October 2012 • NPR
Predicting the Future: Fantasy or a Good Algorithm?
Read more
February 2012 • The Boston Globe
Recorded Future: It's Like Google Meets Nostradamus
Read more
July 2012 • VentureFizz
One of the Coolest Start-Ups – Recorded Future
Read more
November 2011 • Wired Magazine
Crushing the Cost of Predicting the Future
Read more
March 2011 • Business Insider
This Man Can Predict the Future
Read more
November 2011 • Wired Magazine
The News Forecast
Read more
December 2010 • MIT Technology Review
See the Future With a Search
Read more
August 2010 • TechCrunch
TechCrunch Europe: Googling the Future
Read more
July 2010 • Wired Magazine
Exclusive: Google, CIA Invest in ‘Future’ of Web Monitoring
Read more
August 2010 • Gizmag
New Start-Up Uses Internet to Predict the Future
Read more
July 2010 • Gizmodo
CIA and Google’s Joint Investment Raising Eyebrows
Read more
May 2010 • Mashable
Google Invests in App That Predicts the Future
Read more
May 2010 • All Things Digital
Meet Google’s Secret Time Machine Investment
Read more
April 2019 • Information Age
Recorded Future Launches Plug and Play Browser Extension
Read more