/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@recordedfuture

@recordedfuture
13 posts
2024-10-24
Operation Overload, a Russia-aligned influence operation, is aggressively targeting the 2024 US presidential election. https://www.recordedfuture.com/ ... [image]
2024-10-24 View on X
Wired

Microsoft: Russia, China, and Iran are stepping up cyber-influence efforts on the US election; China has focused on down-ballot candidates and Congress members

Russia, Iran, and China are targeting the US election with an evolving array of influence operations in the last days of campaign season.

2024-01-14
New Insikt Group research discusses the frequent abuse of #GitHub's services by cybercriminals and advanced persistent threats (APTs) for various malicious infrastructure schemes. [image]
2024-01-14 View on X
The Register

Recorded Future's security researchers detail the various ways cybercriminals and APTs are frequently abusing GitHub's services to support and deliver malware

Thomas Claburn / The Register :

As GitHub abuse grows, expect more involvement from legitimate internet services in addressing these threats through policy changes and innovations.
2024-01-14 View on X
The Register

Recorded Future's security researchers detail the various ways cybercriminals and APTs are frequently abusing GitHub's services to support and deliver malware

Thomas Claburn / The Register :

There is no universal solution for GitHub abuse detection. A mix of detection strategies tailored to specific environments is essential.
2024-01-14 View on X
The Register

Recorded Future's security researchers detail the various ways cybercriminals and APTs are frequently abusing GitHub's services to support and deliver malware

Thomas Claburn / The Register :

These include payload delivery, dead drop resolving (DDR), full command-and-control (C2), and exfiltration. GitHub's popularity among threat actors lies in its ability to allow them to blend in with legitimate network traffic, making detection and attribution challenging for...
2024-01-14 View on X
The Register

Recorded Future's security researchers detail the various ways cybercriminals and APTs are frequently abusing GitHub's services to support and deliver malware

Thomas Claburn / The Register :

2024-01-13
As GitHub abuse grows, expect more involvement from legitimate internet services in addressing these threats through policy changes and innovations.
2024-01-13 View on X
The Register

Security researchers at Recorded Future detail various ways criminals are frequently abusing GitHub's infrastructure to support and deliver malware

Microsoft says it's doing its best to crack down on crims  —  The popularity of Github has made it too big to block …

There is no universal solution for GitHub abuse detection. A mix of detection strategies tailored to specific environments is essential.
2024-01-13 View on X
The Register

Security researchers at Recorded Future detail various ways criminals are frequently abusing GitHub's infrastructure to support and deliver malware

Microsoft says it's doing its best to crack down on crims  —  The popularity of Github has made it too big to block …

These include payload delivery, dead drop resolving (DDR), full command-and-control (C2), and exfiltration. GitHub's popularity among threat actors lies in its ability to allow them to blend in with legitimate network traffic, making detection and attribution challenging for...
2024-01-13 View on X
The Register

Security researchers at Recorded Future detail various ways criminals are frequently abusing GitHub's infrastructure to support and deliver malware

Microsoft says it's doing its best to crack down on crims  —  The popularity of Github has made it too big to block …

New Insikt Group research discusses the frequent abuse of #GitHub's services by cybercriminals and advanced persistent threats (APTs) for various malicious infrastructure schemes. [image]
2024-01-13 View on X
The Register

Security researchers at Recorded Future detail various ways criminals are frequently abusing GitHub's infrastructure to support and deliver malware

Microsoft says it's doing its best to crack down on crims  —  The popularity of Github has made it too big to block …

2020-09-30
The latest from @TheRecord_Media -> a Russian hacker was sentenced Tuesday for breaching several technology firms, capping a drawn-out legal battle that has involved competing extradition attempts, luxury sports cars, coronavirus delays https://therecord.media/...
2020-09-30 View on X
DataBreaches.net

Yevgeniy Nikulin, a Russian national convicted by a San Francisco federal jury in July for hacking LinkedIn and Dropbox in 2012, sentenced to 7+ years in prison

More than two years after he was extradited from Czechoslovakia where he was arrested in 2016 for hacking LinkedIn, Dropbox …

2020-07-30
In addition to the targeting of entities related to the Catholic Church, Insikt Group identified RedDelta targeting law enforcement and government entities in India and Indonesia: https://www.recordedfuture.com/ ... #ThreatIntelligence #InfoSec #Analysis
2020-07-30 View on X
New York Times

Report: China-linked hackers infiltrated the Vatican's computer networks in the past three months, ahead of the Vatican's diplomatic negotiations with Beijing

New York Times :

Insikt Group has identified and profiled a #cyberespionage campaign attributed to a suspected Chinese state-sponsored threat activity group, which they are tracking as RedDelta: https://www.recordedfuture.com/ ... #InfoSec #Cybersecurity https://twitter.com/...
2020-07-30 View on X
New York Times

Report: China-linked hackers infiltrated the Vatican's computer networks in the past three months, ahead of the Vatican's diplomatic negotiations with Beijing

New York Times :

From early May 2020, the Vatican and the Catholic Diocese of Hong Kong were among several organizations targeted by RedDelta, a Chinese-state sponsored threat activity group tracked by Insikt Group: https://www.recordedfuture.com/ ... #Analysis #InfoSec
2020-07-30 View on X
New York Times

Report: China-linked hackers infiltrated the Vatican's computer networks in the past three months, ahead of the Vatican's diplomatic negotiations with Beijing

New York Times :