News
Your Supply Chain Breach Is Someone Else's Payday
2+ hour ago (644+ words) In March 2026, a group calling itself Team PCP compromised Lite LLM (a Python package with roughly 97 million monthly downloads used by thousands of organizations to connect to AI services) and Checkmarx (one of the most widely used application security testing…...
A New Way to Buy Recorded Future: Solutions and Packages Built for the 2026 Threat Landscape
1+ day, 16+ hour ago (837+ words) PUBLISHED ON 14 APR 2026 The global threat landscape didn't simplify in 2025. It shattered. Recorded Future's Insikt Group" 2026 State of Security documented how geopolitical fragmentation, state-sponsored operations, and criminal ecosystem adaptation reshaped global risk. Threats that once stayed in distinct lanes converged,…...
Third-Party Risk Is an Intelligence Operation. It's Time We Treated It Like One.
6+ day, 47+ min ago (536+ words) Recorded Future sees its inclusion in the 2026 Forrester Wave" for Cybersecurity Risk Ratings Platforms as a reflection of a broader truth: the era of ratings-only vendor risk management is over. For years, the cybersecurity industry has treated third-party risk management…...
2025 Identity Threat Landscape Report: Inside the Infostealer Economy: Credential Threats in 2025
4+ week, 2+ day ago (1535+ words) Inside the Infostealer Economy: Credential Threats in 2025 PUBLISHED ON 16 MAR 2026 Sam Langrock and Dmitry Smilyanets Credential theft is the dominant initial access vector for enterprise breaches. In 2025, Recorded Future detected: Credential compromise from malware logs was not a static risk…...
Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence
1+ mon, 1+ week ago (591+ words) Ask any CISO in Latin America what keeps them up at night and you'll hear the same answers: ransomware, payment fraud, credential theft, supply chain attacks. Then ask them what they're doing about it, and too many will describe a…...
Space and Cyber: The Race Above and the Battle Below
8+ mon, 3+ week ago (855+ words) Space Race 2. 0" is gaining momentum, fueled by the extraordinary value of resources located on Earth's moon, asteroids in our solar system, and other planetary bodies. Cyber threat actors are increasingly targeting organizations operating in the space domain. Many of these…...
HIS Harnesses Threat Intelligence to Block Credential Abuse and Secure Their Attack Surface
2+ mon, 3+ week ago (596+ words) Recorded Future enables Japanese travel giant to slash false positives by 50% across global operations. HIS, a leading Japanese travel company, leverages Recorded Future to achieve unified security operations across its 58 global locations. By enabling early detection of credential leaks and…...
Threat and Vulnerability Management in 2026
2+ mon, 4+ week ago (1198+ words) Thanks to these forces, security teams have found themselves in a state of affairs in which vulnerability management has become an exercise in sheer volume, not risk. Day in and day out, teams are overwhelmed by alerts that lack real-world…...
Best Ransomware Detection Tools
3+ mon, 2+ day ago (640+ words) This gap has created demand for a different approach: intelligence-driven ransomware detection. Rather than waiting for known indicators of compromise, these tools identify the precursor behaviors that happen before encryption (e. g. reconnaissance, credential theft, lateral movement, privilege escalation, and data staging)....
Smarter Cybersecurity with IPv6: How Drip Architecture Defeats Spray-and-Pray Attacks
9+ mon, 3+ week ago (407+ words) What if eliminating opportunistic attacks required nothing more than updating your network architecture? The vast IPv6 address space transforms internet-wide scanning from trivial to computationally impossible, removing one critical leg from the attacker's operational stool. Recent campaigns demonstrate the scale: The…...