RSAC 2025

The Experience Continues Beyond San Francisco

Jump to presentations

Announcements

pzk17ccyqh

Malware Intelligence

Malware Intelligence - Recorded Future announced the next era of malware defense with AI-Powered Malware Intelligence. Transform malware hunting from reactive to proactive. Learn more about Malware Intelligence.

Watch a demo

Fresh re-brand

New and refreshed brand on the expo floor - What better place to show off the bold and striking branding than at RSAC? Featuring “electric blue”, the booth was a beacon to all conference attendees to come see the latest in threat intelligence.

Read about our new rebrand

RSAC 2025 Continues Beyond San Francisco!

The excitement of RSAC 2025 lives on even after the in-person event has concluded in San Francisco! We've curated an outstanding collection of videos and content from the week to ensure you can still experience all the groundbreaking announcements and innovations. Explore how real-time intelligence empowers you to cut through the noise and take precise, proactive actions that keep you consistently ahead of adversaries. Join the many security professionals already benefiting from these valuable resources and discover the transformative insights you can apply to your organization today!

Book a meeting

The Travels of ‘Marko Polo’: Navigating a Global Infostealer Scam Empire
Alexander Leslie, Threat Intelligence Analyst, Insikt, Recorded Future

Available on-Demand*

Thank You For Being a Friend: The Power of Ad Hoc Intel Sharing Groups
Allan Liska

Available on-Demand*

* Requires RSAC access and pass to access recorded sessions on-demand.

The Next Era of Malware Defense Starts Here

Our booth presentations dive into the latest threats, attacker techniques, and how to stop them using actionable intelligence. Learn how malware is evolving and what security teams can do to detect, disrupt, and defend against emerging attacks.
a3t233c70r

AI-Powered Precision: Revolutionizing Security with Advanced Malware Intelligence

Speakers: Michael DiBella, Kathleen Kuczma

Discover how today's sophisticated malware threats remain hidden for an average of 30 days while traditional threat hunting methods fall short due to time constraints and expertise gaps. Our expert speaker will demonstrate how Recorded Future's Malware Intelligence solution analyzes over one million samples daily, instantly generating effective hunting rules that amplify analyst capabilities. Learn how your organization can transform threat hunting from a periodic manual task into a continuous automated process, dramatically reducing the business impact of emerging threats while maximizing your security team's effectiveness.

338kvaj78t

The Essential Threat Hunter’s Toolkit: 5 Malware Queries

Speakers: TJ Nelson, Justin Grosfelt

Learn five essential malware search queries in this interactive workshop where participants follow along in real-time. Master practical techniques for identifying and analyzing threats using our platform's advanced search capabilities. Ideal for both prospects and customers looking to enhance their security workflows with immediately applicable skills.

dwqxvq5kpn

Leveraging Automated Threat Hunting to Detect Malware

Speakers: Anders Hansson, Daniel Gillblad

Discover how Recorded Future's AutoYARA rules based on new and emerging malware patterns can eliminate hours of manual rule writing while enhancing your threat detection capabilities. Our speaker will demonstrate how these rules are validated against known good filesets to minimize false positives, ensuring your team's time is spent on remediation rather than chasing alerts. Learn how confidence metrics and detection ratios provide critical insights into rule coverage and effectiveness, enabling data-driven decisions that strengthen your organization's security posture.

g6c8tptr0z

Deconstructing MintsLoader: A Practical Approach to Malware Research

Speakers: TJ Nelson and Justin Grosfelt

Deconstructing MintsLoader: A Practical Approach to Malware Research and Malware Ecosystems, we explore this sophisticated threat through hands-on reverse engineering techniques while demonstrating how Recorded Future's platform and our research methodologies can help strengthen an organization's defense capabilities.

piwcnv4dff

Uncovering Credential Exposure with Identity Intelligence

Speakers: Dmitry Smilyanets, Lizzie Myers

Using Identity data indexed by Recorded Future’s Intelligence Graph®, understand your organization's compromised credential exposure across hacker forums and dark web markets—before breaches become public. Our speaker will demonstrate how Identity Intelligence enables automated responses to prevent account takeovers, protecting your cloud-based assets from unauthorized access. Register today for a complimentary assessment and receive your organization's personalized Exposure Assessment report.

Experience the power of precision

Request a demo

We have a lot more to offer

  • On-demand demos
    • Watch our on-demand demos and real-world examples to see how our platform turns intelligence into stronger security results
  • Explore our Platform.
    • Discover how our threat intelligence solutions help enhance detection, streamline response, and improve overall security outcomes.
  • World class webinars
    • Gain practical insights and strategies from experts to strengthen your security posture anytime, anywhere.