Analysis Summary A location-specific cyber risk program evaluates cyber threats and risk at non-HQ locations to increase an organization’s information security. Recorded Future expedites threat assessments — down to just two hours to generate an […]
Category: Recorded Future
Recorded Future Announces Its Participation in Splunk’s Adaptive Response Initiative
Earlier this year, Splunk announced their Adaptive Response Initiative — an effort bringing best-in-breed security capabilities together in ways that will improve an organization’s ability to defend against advanced attacks. At the core of the […]
Effective DarkComet RAT Analysis in 10 Minutes and 3 Clicks
Key Takeaways DarkComet RAT controller identified via a Recorded Future and Shodan alert. 10 minutes and three Recorded Future Intel Cards (including embedded Farsight Security and ReversingLabs insight) produced a substantial lead toward probable cause […]
What Is Threat Intelligence? Definition and Examples
Key Takeaways Threat intelligence is the output of analysis based on identification, collection, and enrichment of relevant data and information. Always keep quantifiable business objectives in mind, and avoid producing intelligence “just in case.” Threat […]
How to Maximize the Return From Your Threat Intelligence Reporting
Key Takeaways Reporting is always limited by the quality of your intelligence. Make sure you’re providing genuine value, not just filling pages. If you want to maximize the value of your threat intelligence, you need […]
Lab Test Reveals 10x Productivity Gain From Real-Time Threat Intelligence for SIEMs
Key Takeaways Independent test shows applying real-time threat intelligence powered by machine learning cuts analyst time to triage a security event from a firewall log from three minutes to 1.2 seconds on average (in a […]
How TIAA Uses Threat Intelligence to Enhance Security Awareness
Security awareness and strategic threat intelligence are mandatory elements of any organization’s ability to ward off cyber events. The threat landscape can appear vast and unwieldy, putting additional barriers in the way of creating a […]
Enabling OSINT in Activity Based Intelligence (ABI)
Activity Based Intelligence, or ABI, is an intelligence methodology developed out of the wars in Iraq and Afghanistan used to discover and disambiguate entities (e.g., people of interest) in an increasingly data-rich environment (most of […]
Turbocharge Your Threat Hunting Capability With Intelligent TTP Alerting
Every hour of every day you are either hunting or being hunted. The only question you have to ask is which side do you want to be on?Eric Cole, PhD, SANS Analyst and Network Security […]
Proactive Defense: Understanding the 4 Main Threat Actor Types
Key Takeaways Understanding the four main threat actor types is essential to proactive defense. Cyber criminals are motivated by money, so they’ll attack if they can profit. Hacktivists want to undermine your reputation or destabilize […]