Announcements
Malware Intelligence
Malware Intelligence - Recorded Future announced the next era of malware defense with AI-Powered Malware Intelligence. Transform malware hunting from reactive to proactive. Learn more about Malware Intelligence.
Fresh re-brand
New and refreshed brand on the expo floor - What better place to show off the bold and striking branding than at RSAC? Featuring “electric blue”, the booth was a beacon to all conference attendees to come see the latest in threat intelligence.
RSAC 2025 Continues Beyond San Francisco!
The excitement of RSAC 2025 lives on even after the in-person event has concluded in San Francisco! We've curated an outstanding collection of videos and content from the week to ensure you can still experience all the groundbreaking announcements and innovations. Explore how real-time intelligence empowers you to cut through the noise and take precise, proactive actions that keep you consistently ahead of adversaries. Join the many security professionals already benefiting from these valuable resources and discover the transformative insights you can apply to your organization today!
Featured speakers
* Requires RSAC access and pass to access recorded sessions on-demand.
The Next Era of Malware Defense Starts Here
Our booth presentations dive into the latest threats, attacker techniques, and how to stop them using actionable intelligence. Learn how malware is evolving and what security teams can do to detect, disrupt, and defend against emerging attacks.
AI-Powered Precision: Revolutionizing Security with Advanced Malware Intelligence
Speakers: Michael DiBella, Kathleen Kuczma
Discover how today's sophisticated malware threats remain hidden for an average of 30 days while traditional threat hunting methods fall short due to time constraints and expertise gaps. Our expert speaker will demonstrate how Recorded Future's Malware Intelligence solution analyzes over one million samples daily, instantly generating effective hunting rules that amplify analyst capabilities. Learn how your organization can transform threat hunting from a periodic manual task into a continuous automated process, dramatically reducing the business impact of emerging threats while maximizing your security team's effectiveness.
The Essential Threat Hunter’s Toolkit: 5 Malware Queries
Speakers: TJ Nelson, Justin Grosfelt
Learn five essential malware search queries in this interactive workshop where participants follow along in real-time. Master practical techniques for identifying and analyzing threats using our platform's advanced search capabilities. Ideal for both prospects and customers looking to enhance their security workflows with immediately applicable skills.
Leveraging Automated Threat Hunting to Detect Malware
Speakers: Anders Hansson, Daniel Gillblad
Discover how Recorded Future's AutoYARA rules based on new and emerging malware patterns can eliminate hours of manual rule writing while enhancing your threat detection capabilities. Our speaker will demonstrate how these rules are validated against known good filesets to minimize false positives, ensuring your team's time is spent on remediation rather than chasing alerts. Learn how confidence metrics and detection ratios provide critical insights into rule coverage and effectiveness, enabling data-driven decisions that strengthen your organization's security posture.
Deconstructing MintsLoader: A Practical Approach to Malware Research
Speakers: TJ Nelson and Justin Grosfelt
Deconstructing MintsLoader: A Practical Approach to Malware Research and Malware Ecosystems, we explore this sophisticated threat through hands-on reverse engineering techniques while demonstrating how Recorded Future's platform and our research methodologies can help strengthen an organization's defense capabilities.
Uncovering Credential Exposure with Identity Intelligence
Speakers: Dmitry Smilyanets, Lizzie Myers
Using Identity data indexed by Recorded Future’s Intelligence Graph®, understand your organization's compromised credential exposure across hacker forums and dark web markets—before breaches become public. Our speaker will demonstrate how Identity Intelligence enables automated responses to prevent account takeovers, protecting your cloud-based assets from unauthorized access. Register today for a complimentary assessment and receive your organization's personalized Exposure Assessment report.