Increased Risk of Wiper Attacks
Unit 42 is tracking an increased risk of wiper attacks related to the conflict with Iran, including multiple related incidents impacting organizations in Israel and…
Unit 42 is tracking an increased risk of wiper attacks related to the conflict with Iran, including multiple related incidents impacting organizations in Israel and…
How do you prioritize what vulnerabilities to patch when you have thousands of alerts and critical remote code execution flaws buried next to low-priority information…
Key Takeaways The average organization today relies on multiple platforms and tools delivering round-the-clock feeds of security information and alerts. Under this deluge of data,…
Summary Advances in large-language models (LLMs) and the anticipated arrival of artificial general intelligence (AGI) are rapidly closing the gap between concept and capability. The…
Key Takeaways The traditional “digital perimeter” paradigm for enterprise cybersecurity is no longer relevant in today’s online landscape. Instead of defending one’s internal network from…
The cybersecurity landscape has reached a point of total convergence, where the silos that once separated malware, identity, and infrastructure have collapsed into a single,…
On November 23, 2025, Gainsight confirmed that it’s actively investigating unusual activity involving its applications that are integrated with Salesforce—an incident that underscores the growing…
Introduction Generative AI (GenAI) and large language models (LLMs) are being rapidly integrated into all aspects of our society, from communication to cybersecurity. Enterprises and…
Introduction When ransomware struck Change Healthcare in February 2024, the attack paralyzed prescription processing across the United States, forcing pharmacies to turn patients away and…
The Rise of CopyCop: When Influence Operations Go Fully Digital The latest Insikt Group report exposes one of the most expansive Russian influence operations to…
Introduction In Recorded Future’s 2025 State of Threat Intelligence report, 49% of enterprises describe their threat intelligence maturity as advanced — a figure that might…
CVE-2025-55182 Intelligence Card c/o Recorded Future There are now multiple publicly available exploit scripts (I forked one on GitHub here) for the React and Next.js…