Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

recordedfuture.com

Recorded Future

Get the latest updates from Recorded Future directly as they happen.

Follow now 291 followers

Latest posts

Last updated 2 days ago

2025 Cloud Threat Hunting and Defense Landscape

3 days ago

Executive Summary Insikt Group has observed continued trends of growth and increased...

GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack

4 days ago

Executive Summary Insikt Group has been monitoring GrayCharlie, a threat actor overlapping...

Network Intelligence: Your Questions, Global Answers

6 days ago

The Problem with Pre-Packaged Intelligence Security teams are drowning in threat intelligence...

Fragmentation Defined 2025's Threat Landscape. Here's What It Means for 2026

10 days ago

Uncertainty has become the operating environment for business. And this year, fragmentation...

State of Security Report | Recorded Future

10 days ago

Fragmentation is the new normal The global threat landscape didn't simplify in...

From 27 Steps to 5: How Recorded Future Reimagined Threat Hunting with Autonomous Threat Operations

11 days ago

The manual operations gap can be a business risk Manual threat hunting...

Rublevka Team: Anatomy of a Russian Crypto Drainer Operation

18 days ago

Executive Summary Insikt Group has identified a major cybercriminal operation specializing in...

Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team | Recorded Future

21 days ago

Key Takeaways Recorded Future deployed Autonomous Threat Operations within its own SOC...

Threat and Vulnerability Management in 2026

about 1 month ago

Key Takeaways Traditional vulnerability management tools can no longer keep up with...

December 2025 CVE Landscape: 22 Critical Vulnerabilities Mark 120% Surge, React2Shell Dominates Threat Activity

about 1 month ago

December 2025 witnessed a dramatic 120% increase in high-impact vulnerabilities, with Recorded...

Best Ransomware Detection Tools

about 1 month ago

Key Takeaways Effective ransomware detection requires three complementary layers: endpoint and extended...

Digital Threat Detection Tools & Best Practices

about 1 month ago

Key Takeaways Intelligence drives better decisions. High-performing teams use threat intelligence not...