4 Ways to Stop APT Attacks Using Web Intelligence
In case you missed it, below is a brief recap of our webinar yesterday with Oren Falkowitz. Oren began with a baseline, observing most efforts to combat APTs (Advanced Persistent Threats) focus on...
View ArticleDan Geer on Web Intelligence and Cyber Security
The following interview is with Dan Geer and is from our Web Intelligence Perspectives Series. Dan is currently the chief information security officer for In-Q-Tel. What is it about web intelligence...
View ArticleShedding Light on STTEAM
Researchers from Fidelis Security in February reported a newly identified cyber campaign dubbed STTEAM (PDF) found to be targeting oil and gas companies in the Middle East. The Fidelis team provided...
View ArticleUnderstanding Moroccan Politics With Open Source Intelligence
Analysis Summary Open source intelligence indicates political tensions surrounding the Moroccan Justice and Development Party steadily increased between 2012 and 2013. Open source intelligence also...
View ArticleIranian Hacker Network Linked to Familiar Group?
News of an Iranian hacker network targeting US government officials made waves yesterday after being uncovered by iSIGHT Partners. Buried deep in Reuters’ report is a password used by the group:...
View ArticleCyber Threat Landscape: Basic Overview and Attack Methods
This is the first post in our blog series that aims to provide a basic overview of the contemporary cyber threat landscape. The flourishing synergy between the internet and its beneficiaries, who use...
View ArticleCyber Threat Landscape: Attackers and Operations
This is the second post in our blog series that aims to provide a basic overview of the contemporary cyber threat landscape. In 1996, a group of RAND researchers published a seminal book on the then...
View ArticleCyber Threat Landscape: Forecast
This is the third post in our blog series that aims to provide a basic overview of the contemporary cyber threat landscape. According to United Nations Office on Drugs and Crime’s (UNODC) Comprehensive...
View ArticleHow to Use STIX for Automated Sharing and Graphing of Cyber Threat Data
MITRE, a not-for-profit organization with offices near Boston and Washington, D.C., has developed several interrelated toolkits to enable sharing of cyber threat intelligence between trusted parties....
View ArticleNavigating the Future With Web Data: Christopher Ahlberg at TEDxCambridge 2014
Is it really possible to know the future? Recorded Future CEO Christopher Ahlberg says yes, if we organize the web for analysis, rather than search. With those insights in hand, leaders can make...
View ArticleIs it Possible to Use Web Intelligence to Forecast International Crisis?
By using Recorded Future in conjunction with traditional ethnographic techniques, it is possible for us to significantly increase our accuracy in forecasting international and diplomatic crisis. This...
View ArticleRecap: Spring 2014 Product Improvements
Now that summer is here, let’s recap the Recorded Future product improvements we rolled out over the last three months. With our SaaS approach, we deliver improvements in weekly increments, along with...
View Article4 Ways Alert Logic Leverages Open Source Intelligence
Last week, we were thrilled to present a webinar featuring threat intelligence expert Stephen Coty. Stephen is the Chief Security Evangelist of Alert Logic, a well-known managed security service...
View ArticleBuk SAMs and the Downing of MH17
Analysis Summary Recorded Future web intelligence highlights multiple June/July reports that Ukrainian separatists had acquired Buk anti-aircraft missiles. With hindsight, it’s surprising that these...
View ArticleMonitoring Arms Control Compliance With Web Intelligence
Can we find insights for defense against chemical and biological weapon threats by analyzing livestock disease outbreaks and public health crises? Research by Maynard Holliday of Sandia National Labs...
View ArticleAssessing MH17-Themed Cyber Threats
In our webinar today we assessed the aftermath of the MH17 tragedy from a threat intelligence perspective. Together with our guest Rich Barger, Chief Intelligence Officer of Cyber Squared Inc., we...
View ArticleHow Al-Qaeda Uses Encryption Post-Snowden (Part 2) – New Analysis in...
Analysis Summary Al-Qaeda (AQ) encryption product releases have continued since our May 8, 2014 post on the subject, strengthening earlier hypothesis about Snowden leaks influencing AQ crypto product...
View ArticleAl-Qaeda and Snowden: Correlation, Causation, and Temporal Analysis
Our recent research on Al-Qaeda encryption again generated a tremendous amount of interest which we were thrilled to see, with stories in NPR, Wall Street Journal, Ars Technica, ABC News, Washington...
View ArticleThe Power of the Web: Anticipating Cyber Attacks
IT security teams are under siege, constantly defending against data breaches, IP theft, cyber crime, and other threats in a long and costly war. Interpol estimates cyber crime costs people and...
View ArticleIntegrating Recorded Future with Maltego
The after-action report from Black Hat 2014… Paterva’s Maltego product is a great “Swiss army knife” for researching IT infrastructure – whether the context is performing recon for pen-testing, reverse...
View Article