Quantcast
Channel: Recorded Future
Browsing all 90 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Syrian Hackers Wage Misinformation War

It’s unnerving to see the anomaly dominating the picture at right (and the real world market value loss) and find out it was the result of a single bad tweet. But that’s exactly what happened earlier...

View Article



Image may be NSFW.
Clik here to view.

SEA and Anonymous, Allies by Convenience in Attacks on Turkey

Click for interactive view War sometimes makes strange bedfellows, and the cyber battlefield is proving to be no different. Two prominent hacker collectives (or government organizations depending on...

View Article

Image may be NSFW.
Clik here to view.

Syrian Electronic Army inspired by previous Anonymous hack of Melbourne IT?

Reposted from Social Media Threat. Earlier this week, the New York Times, Twitter, and the Huffington Post UK experienced disruptions to their websites that included visitors being redirected to sites...

View Article

Image may be NSFW.
Clik here to view.

Syrian Electronic Army Attacks Linked to Political Statements on Syria

Originally published on October 9, 2013 by Mashable in an article entitled Syrian Electronic Army Attacks Linked to Obama’s Mentions of Syria. From Mashable: The frequency of attacks that the infamous...

View Article

Image may be NSFW.
Clik here to view.

Syrian Electronic Army Continues to Adapt, Targeting Communications Partners

Last weekend, the Syrian Electronic Army again grabbed headlines with a high-profile attack on BarackObama.com. An aspect that caught our attention is how the SEA continues to adapt their methods by...

View Article


Image may be NSFW.
Clik here to view.

Measuring the Media Impact of Hacktivists

How can we measure the success of hacktivists? Certainly, achievement of a desired political change is the choice outcome. But seeking a non-zero metric, let’s consider the amount of media coverage an...

View Article

Image may be NSFW.
Clik here to view.

Which Hacker Groups Give Warning of Cyber Attacks?

We’ve previously considered media impact as a success criterion for hackers. This led us to report the most media-savvy hacktivists. In their respective ways, groups like the Syrian Electronic Army,...

View Article

Image may be NSFW.
Clik here to view.

‘Islamic Cyber Resistance’ Breaks Iranian Hacker Silence, Exposes Links to SEA

The freeze on Iranian hacktivist activity during nuclear negotiations was broken last week although it doesn’t appear to be government sponsored. The Islamic Cyber Resistance (ICR), not yet discussed...

View Article


Image may be NSFW.
Clik here to view.

Syrian Electronic Army Phishing in Turkey, Turkish Hackers Retaliate

The Syrian Electronic Army was busy playing both offense and defense last week. They reportedly gained access to multiple Microsoft assets including social media channels and the Official Microsoft...

View Article


Image may be NSFW.
Clik here to view.

How Al-Qaeda Uses Encryption Post-Snowden (Part 1)

Analysis Summary Since 2007, Al-Qaeda’s use of encryption technology has been based on the Mujahideen Secrets platform which has developed to include support for mobile, instant messaging, and Macs....

View Article

Image may be NSFW.
Clik here to view.

Combating Child Sex Trafficking Through Web Intelligence

Child sex trafficking is one of the most horrific crimes on planet Earth. According to victims’ advocates, most human trafficking is undetected and unreported. Exceptional crimes like the recent Boko...

View Article

Image may be NSFW.
Clik here to view.

Will Egypt’s Presidential Election Bring More Unrest?

On May 26 and 27, Egypt will hold its second presidential election in two years. In 2012, Muslim Brotherhood candidate Mohammed Morsi was elected president. This year, the man responsible for deposing...

View Article

Image may be NSFW.
Clik here to view.

How Governments Can Use Web Intelligence for Insights

The following interview is with Simon Thacker and is from our Web Intelligence Perspectives Series. Simon is head of strategic early warning for the UK Cabinet Office. What is it about web intelligence...

View Article


Image may be NSFW.
Clik here to view.

Working With ThreatConnect to Give Cyber Attacks Context

Recorded Future recently partnered with our friends at ThreatConnect to provide geopolitical context to their excellent analysis on cyber espionage in the South China Sea. We love this quote by the...

View Article

Image may be NSFW.
Clik here to view.

4 Ways to Stop APT Attacks Using Web Intelligence

In case you missed it, below is a brief recap of our webinar yesterday with Oren Falkowitz. Oren began with a baseline, observing most efforts to combat APTs (Advanced Persistent Threats) focus on...

View Article


Image may be NSFW.
Clik here to view.

Dan Geer on Web Intelligence and Cyber Security

The following interview is with Dan Geer and is from our Web Intelligence Perspectives Series. Dan is currently the chief information security officer for In-Q-Tel. What is it about web intelligence...

View Article

Image may be NSFW.
Clik here to view.

Shedding Light on STTEAM

Researchers from Fidelis Security in February reported a newly identified cyber campaign dubbed STTEAM (PDF) found to be targeting oil and gas companies in the Middle East. The Fidelis team provided...

View Article


Image may be NSFW.
Clik here to view.

Understanding Moroccan Politics With Open Source Intelligence

Analysis Summary Open source intelligence indicates political tensions surrounding the Moroccan Justice and Development Party steadily increased between 2012 and 2013. Open source intelligence also...

View Article

Image may be NSFW.
Clik here to view.

Iranian Hacker Network Linked to Familiar Group?

News of an Iranian hacker network targeting US government officials made waves yesterday after being uncovered by iSIGHT Partners. Buried deep in Reuters’ report is a password used by the group:...

View Article

Image may be NSFW.
Clik here to view.

Cyber Threat Landscape: Basic Overview and Attack Methods

This is the first post in our blog series that aims to provide a basic overview of the contemporary cyber threat landscape. The flourishing synergy between the internet and its beneficiaries, who use...

View Article
Browsing all 90 articles
Browse latest View live




Latest Images