How to Fight Back in the Age of Synthetic Media
The Rise of CopyCop: When Influence Operations Go Fully Digital The latest Insikt Group report exposes one of the most expansive Russian influence operations to…
The Rise of CopyCop: When Influence Operations Go Fully Digital The latest Insikt Group report exposes one of the most expansive Russian influence operations to…
Introduction In Recorded Future’s 2025 State of Threat Intelligence report, 49% of enterprises describe their threat intelligence maturity as advanced — a figure that might…
CVE-2025-55182 Intelligence Card c/o Recorded Future There are now multiple publicly available exploit scripts (I forked one on GitHub here) for the React and Next.js…
Key Points Iran-linked actors are increasingly engaging with the cyber crime ecosystem. Their activity suggests a growing reliance on criminal tools, services, and operational models…
In the wake of the Salesforce/Gainsight breach (kudos to Salesforce for transparently sharing indicators of compromise and updated progress on remediation), third-party cyber and exposure…
The New Risk Equation: When Cyber Becomes Physical The boundary between cyber and physical threats has blurred in ways that would have been difficult to…
Last updated on 9 December. A critical vulnerability in React Server Components is allegedly being actively exploited by multiple Chinese threat actors, Recorded Future recommends…
November 2025 saw a significant 69% decrease in high-impact vulnerabilities, with Recorded Future’s Insikt Group® identifying 10 vulnerabilities requiring immediate attention, down from 32 in…
Introduction The cybersecurity landscape is rapidly growing in scale and complexity. Enterprises face a rising tide of sophisticated threats that cannot be contained by traditional,…
Executive Summary China’s observed use of zero-days has declined since 2023. However, it has expanded its capacity to discover and manage vulnerabilities, signaling a continued…
What Happened In November 2025, Anthropic disclosed the first known cyber-espionage campaign conducted primarily by an autonomous AI system, attributed to a Chinese state-sponsored threat…
Executive Summary Regional conflicts and weakened international institutions are driving the use of offensive cyber operations beyond the “Big Four” (China, Russia, Iran, and North…