The WIRED Guide to Digital Opsec for Teens
Practicing good âoperations securityâ is essential to staying safe online. Here's a complete guide for teenagers (and anyone else) who wants to button up their digital lives.
Prompt Injection Through Poetry
In a new paper, âAdversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models,â researchers found that turning LLM prompts into poetry resulted in jai...
Why Organizations Are Turning to RPAM
Organizations are adopting Remote Privileged Access Management (RPAM) to secure access in all environments. Learn how RPAM works and why you should ad
The CSO guide to top security conferences
Tracking postponements, cancellations, and conferences gone virtual â CSO Onlineâs calendar of upcoming security conferences makes it easy to find the events that matter the most t...
OpenAI-Dienstleister gehackt
OpenAI informiert seine Kunden aktuell Ăźber einen Cyberangriff bei seinem Datenanalyseanbieter. Dabei sind auch Daten abgeflossen.
When Buyers Discount MSPs With One Big Customer
Your biggest customer loves you. Three years together. They trust you, pay on time, and refer others. From where you sit, thatâs loyalty. From where a buyer sits, thatâs a $$$ disc...
Huawei and Chinese Surveillance
This quote is from House of Huawei: The Secret History of Chinaâs Most Powerful Company. âLong before anyone had heard of Ren Zhengfei or Huawei, Wan Runnan had been Chinaâs star e...
Friday Squid Blogging: New âSquidâ Sneaker
I did not know Adidas sold a sneaker called âSquid.â As usual, you can also use this squid post to talk about the security stories in the news that I havenât covered. Blog moderati...
More on Rewiring Democracy
Itâs been a month since Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship was published. From what we know, sales are good. Some of the bookâs for...
AI as Cyberattacker
From Anthropic: In mid-September 2025, we detected suspicious activity that later investigation determined to be a highly sophisticated espionage campaign. The attackers used AIâs ...
ToddyCat: your hidden email assistant. Part 1
Kaspersky experts analyze the ToddyCat APT attacks targeting corporate email. We examine the new version of TomBerBil, the TCSectorCopy and XstReader tools, and methods for stealin...
Scam USPS and E-Z Pass Texts and Websites
Google has filed a complaint in court that details the scam: In a complaint filed Wednesday, the tech giant accused âa cybercriminal group in Chinaâ of selling âphishing for dummie...
Inside the dark web job market
This report examines how employment and recruitment function on the dark web, based on over 2,000 job-related posts collected from shadow forums between January 2023 and June 2025.
Threat Intelligence Automation
Discover how threat intelligence automation from Recorded Future empowers security teams with real-time insights, faster response, and greater efficiency.
Security Leaders Respond to Cloudfare Outage
On Tuesday, November 18, Cloudfare experienced an outage that led to several websites being slow to load or completely unavailable. The outage affected programs such at ChatGPT, X,...
Legal Restrictions on Vulnerability Disclosure
Kendra Albert gave an excellent talk at USENIX Security this year, pointing out that the legal agreements surrounding vulnerability disclosure muzzle researchers while allowing com...
Operational Cyber Threat Intelligence
Move beyond noise. Learn how to build effective threat intelligence operations that turn raw data into actionable insights and proactive cyber defense.
Microsoft Patch Tuesday, November 2025 Edition
Microsoft this week pushed security updates to fix more than 60 vulnerabilities in its Windows operating systems and supported software, including at least one zero-day bug that is...
Third-Party Risk Statistics
Explore the latest third-party risk statistics and learn how data-driven, continuous monitoring for third-party risk assessments can protect your supply chain.
Threat Intelligence & the C-Suite
Discover how threat intelligence has moved from the SOC to the boardroom. Learn why modern enterprises use it to drive strategic decisions, manage risk, and power governance across...
Web Authentication is Broken
âThe real trouble with this world of ours is not that it is an unreasonable world, nor even that it is a reasonable one. The commonest kind of trouble is that it is nearly reasonab...
Threat Hunting vs. Threat Intelligence
Understand the difference between threat hunting vs. threat intelligence, why both matter for security, and how Recorded Future empowers proactive cyber defense.
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security.
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security.
October 2025 CVE Landscape
Discover the top 32 high-risk CVEs identified in October 2025 by Recorded Futureâs Insikt Group, including active zero-day exploits, legacy system threats, and CL0P ransomware camp...
Ransomware Detection With Real-Time Data
Learn why timely, relevant data is crucial for effective ransomware detection and what you can do to help prevent ransomware attacks and safeguard your organization.
How are you managing cloud risk?
We know cloud-native application protection platform (CNAPP) helps manage cloud risk, however, these other elements must be considered.
Digital Risk Management Strategies
Discover digital risk management strategies for enterprises. Learn how to identify, monitor, and mitigate digital risks with real-time threat intelligence.
Mem3nt0 mori â The Hacking Team is back!
Kaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the ForumTroll APT attacks.
How to Prevent Ransomware
Learn to how to prevent ransomware attacks before they materialize with proactive threat intelligence
September 2025 CVE Landscape
Discover the top 16 exploited vulnerabilities from September 2025, including critical Cisco and TP-Link flaws, malware-linked CVEs, and actionable threat intelligence from Recorded...
Scammers Up Their Game With AI
Learn how to spot the threats and protect yourself from scammers using AI for phishing and deepfakes with smart security practices.
What is a Fraud Scheme?
The fraud auditing industry uses so many terms interchangeably that it creates confusion. Let's cut the confusion and implement better fraud definitions.
Beware: Tax Season is Scam Season
Tax season is also prime time for tax scams. To safeguard your personal information, consider these key points: Communication methods The IRS initiates contact primarily through ma...
âTis the Season for Holiday Shopping Scams
The holidays are typically the time of year for gifting presents to friends and family or donations to charity. Unfortunately, not-so-jolly fraudsters take advantage of this genero...
IRS Identity Theft Season Begins Now
Each year thieves try to steal billions in federal withholdings by stealing your identity. As the IRS focuses more attention on this quickly growing problem, now is the time of yea...
Five Ways to Protect Your Finances from Fraud
With fraud on the rise, itâs important to understand how to best protect yourself and your financial accounts. Here are five ways you can stay proactive to avoid fraudulent credit ...
The Worldâs Identity Platform
Learn about the new Trulioo integrated, high-speed, global identity platform that helps your organization foster growth, innovation and trust.