🏠 Home
Cybersecurity
🔐
Cybersecurity
1 channels · 54 articles
Articles
Latin America and the Caribbean Cybercrime Landscape
Executive Summary
This report provides an overview of trends and developments in the cybercriminal ecosystem of Latin America and the Caribbean (LAC) in 2025. Insikt Group found that threat actors operating in or targeting the LAC region predominantly use client-server applications and end-to-end encrypted messaging platforms such as Telegram, as well as established English- or Russian-speaking dark web and special-access forums, to communicate and conduct activities. Threat actors demon
0
1
Industrialization of the Fraud Ecosystem Blog
Payment fraud no longer operates as a collection of discrete schemes run by individual threat actors.
It is increasingly sustained by an industrial support ecosystem: purpose-built infrastructure, packaged toolkits, and professionalized services that allow threat actors to maximize fraud output while minimizing the skill and effort required to execute attacks.According to Recorded Future's Annual Payment Fraud Intelligence Report: 2025, this industrialization was driven by technical adva
0
2
The Shift: An Era of Quantum Geopolitics
The expanding conflict around Iran signals a deeper shift. We have entered an era of quantum geopolitics, where the old rules of the international order no longer apply. What began as a regional confrontation is already reshaping global markets, supply chains, and corporate security planning. Leaders must adapt how they think, spend, and communicate in a system where uncertainty is not a risk to manage—it is the operating environment itself.
What is Quantum Geopolitics?
A useful
0
2
ClickFix Campaigns Targeting Windows and macOS
Executive Summary
Insikt Group identified five distinct clusters leveraging the ClickFix social engineering technique to facilitate initial access to host systems. Observed since at least May 2024, these clusters include those impersonating financial application Intuit QuickBooks and the travel agency Booking.com. Insikt Group leveraged the Recorded Future® HTML Content Analysis dataset, which enables systematic monitoring of embedded web artifacts to identify and track new malicious dom
0
1
The Iran War: What You Need to Know
Last updated: 20 March 2026 at 2200 GMT
This report is continuously updated as the situation evolves across the geopolitical, cyber, and influence operations dimensions of this conflict. It will be of greatest interest to organizations in the US, Israel, and Gulf states concerned about targeting by Iranian state-sponsored or state-aligned threat actors, as well as those with exposure to energy markets, maritime shipping, and critical infrastructure potentially impacted by regional escala
0
2
2025 Year in Review: Malicious, Infrastructure
Executive Summary
In 2025, Insikt Group significantly expanded its tracking of malicious infrastructure, broadeningcoverage across additional malware families and threat categories spanning cybercriminal and APT activity. This expansion included deeper analysis of infrastructure types, enhanced integration of data sources such as Recorded Future Network Intelligence®, improved threat detection methodologies,more granular higher-tier infrastructure insights, expanded victimology analysis,
0
2
2025 Identity Threat Landscape Report: Inside the Infostealer Economy: Credential Threats in 2025
Executive Summary
Credential theft is the dominant initial access vector for enterprise breaches. In 2025, Recorded Future detected:
1.95 billion malware combo list credential exposures
36 million database combo list credential exposures
24 million database dump credential exposures
892 million malware log credential exposures
Five findings stand out from the data:
Credential theft accelerated as the yea
0
2
February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January
February 2026 saw a 43% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 13 vulnerabilities requiring immediate remediation, down from 23 in January 2026. All 13 carried a ‘Very Critical’ Recorded Future Risk Score.
What security teams need to know:
Microsoft dominates: Six of 13 vulnerabilities affected Microsoft products, accounting for 46% of February's findings; all were added to CISA's KEV catalog on the same day
0
2
Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence
Key Takeaways
Latin America faces a distinct and evolving cyber threat landscape, from PIX payment fraud to ransomware hitting critical infrastructure.
Most LATAM security teams are still reactive by necessity, and that posture is costing organizations in downtime, data, and trust.
Recorded Future offers LATAM-specific threat intelligence, automation, and 100+ integrations to help stretched teams get ahead of attacks before they land.
Meet us at R
0
2
Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA
Recorded Future is expanding its payment fraud prevention capabilities through a partnership with CYBERA, the industry leader in detecting and verifying data on scam-linked bank accounts.
Available for purchase now via the Recorded Future Platform, Money Mule Intelligence helps fraud teams identify the accounts criminals use to extract and move stolen funds—addressing a critical gap as scams increasingly become banks' most pressing fraud challenge.
The Growing Threat of Authorize
0
2
January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day
January 2026 saw a modest 5% increase in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 23 vulnerabilities requiring immediate remediation, up from 22 in December 2025. Noteworthy trends last month included Russian state-sponsored exploitation of a Microsoft Office zero-day and critical authentication bypass flaws affecting enterprise infrastructure.
What security teams need to know:
APT28's Operation Neusploit: Russian state-sponsored ac
0
2
Preparing for Russia’s New Generation Warfare in Europe
Executive Summary
Since its full-scale invasion of Ukraine in February 2022, Russia has waged what we assess is largely opportunistic, though increasingly aggressive, hybrid warfare in NATO territory. Moscow has very likely not yet leveraged its full capability to integrate cyber, political, and sabotage tools into a full-scale campaign.
Over the next two years, Russian President Vladimir Putin will likely escalate Russia’s hybrid warfare campaign against NATO members into a full
0
2
2025 Cloud Threat Hunting and Defense Landscape
Executive Summary
Insikt Group has observed continued trends of growth and increased activity of threat actors leveraging and exploiting cloud infrastructure to broaden the number of victims they target and infect. Recent reporting across the observed incidents shows that cloud-focused threats are converging on a few consistent patterns, which serve as the main sections of this report:
Exploitation and Misconfiguration
Cloud Abuse
Cloud Ransomware
0
2
GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack
Executive Summary
Insikt Group has been monitoring GrayCharlie, a threat actor overlapping with SmartApeSG and active since mid-2023, for some time, and is now publishing its first report on the group. GrayCharlie compromises WordPress sites and injects them with links to externally hosted JavaScript that redirects visitors to NetSupport RAT payloads delivered via fake browser update pages or ClickFix mechanisms. These infections often progress to the deployment of Stealc and SectopRAT.
0
1
Network Intelligence: Your Questions, Global Answers
The Problem with Pre-Packaged Intelligence
Security teams are drowning in threat intelligence feeds. Hundreds of vendors promise comprehensive coverage, real-time alerts, and actionable insights. Yet sophisticated adversaries continue to operate undetected, incidents take weeks to scope, and attribution remains elusive.
The fundamental issue isn't quality but control. Traditional network visibility solutions force passive consumption: their alerts, their priorities, their timelin
0
1
State of Security Report | Recorded Future
Fragmentation is the new normal
The global threat landscape didn't simplify in 2025—it shattered. Geopolitical alliances strained. Criminal enterprises splintered and regrouped. State-sponsored actors shifted from dramatic disruptions to quiet pre-positioning. And as long-established norms unwound, convergence across once-distinct domains created unprecedented uncertainty.
The 2026 State of Security report delivers Insikt Group's most comprehensive annual analysis of
0
2
Fragmentation Defined 2025's Threat Landscape. Here's What It Means for 2026
Uncertainty has become the operating environment for business. And this year, fragmentation is driving it.
The global threat landscape didn't simplify in 2025; it shattered. Geopolitical alliances strained. Criminal enterprises splintered under law enforcement pressure, then regrouped into smaller, faster, and harder-to-track operations. State-sponsored cyber actors shifted from dramatic disruptions to quiet pre-positioning, embedding themselves in networks and waiting. Hacktivist groups
0
2
From 27 Steps to 5: How Recorded Future Reimagined Threat Hunting with Autonomous Threat Operations
The manual operations gap can be a business risk
Manual threat hunting requires 27 steps that burn analyst time
Autonomous Threat Operations can reduce 27 steps to 5
Autonomous operations prove measurable ROI
0
3
Rublevka Team: Anatomy of a Russian Crypto Drainer Operation
Executive Summary
Insikt Group has identified a major cybercriminal operation specializing in large-scale cryptocurrency theft, operating under the moniker “Rublevka Team”. Since its inception in 2023, the threat group has generated over $10 million through affiliate-driven wallet draining campaigns. Rublevka Team is an example of a “traffer team,” composed of a network of thousands of social engineering specialists tasked with directing victim traffic to malicious pages. Unlike traditio
0
2
Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team | Recorded Future
Key Takeaways:
Recorded Future deployed Autonomous Threat Operations within its own SOC before customer release, ensuring real-world effectiveness and identifying critical capabilities.
Autonomous Threat Operations reduced analyst-dependent, inconsistent processes, creating standardized hunts that deliver the same input, output, and expectations every time.
Team members now run 15-20 threat hunts weekly—work that previously required days or weeks of manual
0
2
2025 Identity Threat Landscape Report: Inside the Infostealer Economy: Credential Threats in 2025
0
2
February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January
0
2
Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence
0
2
Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA
0
2
January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day
0
2
Preparing for Russia’s New Generation Warfare in Europe
0
2
GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack
0
1
Network Intelligence: Your Questions, Global Answers
0
1
Fragmentation Defined 2025's Threat Landscape. Here's What It Means for 2026
0
2
From 27 Steps to 5: How Recorded Future Reimagined Threat Hunting with Autonomous Threat Operations
0
3
Latin America and the Caribbean Cybercrime Landscape
Executive Summary
This report provides an overview of trends and developments in the cybercriminal ecosystem of Latin Amer…
💬 0
👁 1
Industrialization of the Fraud Ecosystem Blog
Recorded Future · 5d ago
💬 0
👁 2
The Shift: An Era of Quantum Geopolitics
Recorded Future · 5d ago
💬 0
👁 2
ClickFix Campaigns Targeting Windows and macOS
Recorded Future · Mar 25, 2026
💬 0
👁 1

The Iran War: What You Need to Know
Recorded Future · Mar 20, 2026

2025 Year in Review: Malicious, Infrastructure
Recorded Future · Mar 19, 2026

2025 Identity Threat Landscape Report: Inside the Infostealer Economy: Credential Threats in 2025
Recorded Future · Mar 16, 2026

February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January
Recorded Future · Mar 12, 2026
Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence
Key Takeaways
Latin America faces a distinct and evolving cyber threat landscape, from PIX payment fraud to ran…
💬 0
👁 2
Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA
Recorded Future · Feb 26, 2026
💬 0
👁 2
January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day
Recorded Future · Feb 24, 2026
💬 0
👁 2
Preparing for Russia’s New Generation Warfare in Europe
Recorded Future · Feb 24, 2026
💬 0
👁 2

2025 Cloud Threat Hunting and Defense Landscape
Recorded Future · Feb 19, 2026

GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack
Recorded Future · Feb 18, 2026

Network Intelligence: Your Questions, Global Answers
Recorded Future · Feb 16, 2026

State of Security Report | Recorded Future
Recorded Future · Feb 12, 2026
Fragmentation Defined 2025's Threat Landscape. Here's What It Means for 2026
Uncertainty has become the operating environment for business. And this year, fragmentation is driving it.
The global thre…
💬 0
👁 2
From 27 Steps to 5: How Recorded Future Reimagined Threat Hunting with Autonomous Threat Operations
Recorded Future · Feb 11, 2026
💬 0
👁 3
Rublevka Team: Anatomy of a Russian Crypto Drainer Operation
Recorded Future · Feb 4, 2026
💬 0
👁 2
Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team | Recorded Future
Recorded Future · Feb 1, 2026
💬 0
👁 2
Latin America and the Caribbean Cybercrime Landscape
Executive Summary
This report provides an overview of trends and developments in the cybercriminal ecosystem of Latin America and the Caribbean (LAC) in 2025. Insikt Group found that threat actors operating in or targeting the LAC region predominantly use client-server applications and end-to-end encrypted messaging platforms such as Telegram, as well as established English- or Russian-speaking dark web and special-access forums, to communicate and conduct activities. Threat actors demon
0
1 👁
Industrialization of the Fraud Ecosystem Blog
Payment fraud no longer operates as a collection of discrete schemes run by individual threat actors.
It is increasingly sustained by an industrial support ecosystem: purpose-built infrastructure, packaged toolkits, and professionalized services that allow threat actors to maximize fraud output while minimizing the skill and effort required to execute attacks.According to Recorded Future's Annual Payment Fraud Intelligence Report: 2025, this industrialization was driven by technical adva
0
2 👁
The Shift: An Era of Quantum Geopolitics
The expanding conflict around Iran signals a deeper shift. We have entered an era of quantum geopolitics, where the old rules of the international order no longer apply. What began as a regional confrontation is already reshaping global markets, supply chains, and corporate security planning. Leaders must adapt how they think, spend, and communicate in a system where uncertainty is not a risk to manage—it is the operating environment itself.
What is Quantum Geopolitics?
A useful
0
2 👁
ClickFix Campaigns Targeting Windows and macOS
Executive Summary
Insikt Group identified five distinct clusters leveraging the ClickFix social engineering technique to facilitate initial access to host systems. Observed since at least May 2024, these clusters include those impersonating financial application Intuit QuickBooks and the travel agency Booking.com. Insikt Group leveraged the Recorded Future® HTML Content Analysis dataset, which enables systematic monitoring of embedded web artifacts to identify and track new malicious dom
0
1 👁
The Iran War: What You Need to Know
Last updated: 20 March 2026 at 2200 GMT
This report is continuously updated as the situation evolves across the geopolitical, cyber, and influence operations dimensions of this conflict. It will be of greatest interest to organizations in the US, Israel, and Gulf states concerned about targeting by Iranian state-sponsored or state-aligned threat actors, as well as those with exposure to energy markets, maritime shipping, and critical infrastructure potentially impacted by regional escala
0
2 👁
2025 Year in Review: Malicious, Infrastructure
Executive Summary
In 2025, Insikt Group significantly expanded its tracking of malicious infrastructure, broadeningcoverage across additional malware families and threat categories spanning cybercriminal and APT activity. This expansion included deeper analysis of infrastructure types, enhanced integration of data sources such as Recorded Future Network Intelligence®, improved threat detection methodologies,more granular higher-tier infrastructure insights, expanded victimology analysis,
0
2 👁
2025 Identity Threat Landscape Report: Inside the Infostealer Economy: Credential Threats in 2025
Executive Summary
Credential theft is the dominant initial access vector for enterprise breaches. In 2025, Recorded Future detected:
1.95 billion malware combo list credential exposures
36 million database combo list credential exposures
24 million database dump credential exposures
892 million malware log credential exposures
Five findings stand out from the data:
Credential theft accelerated as the yea
0
2 👁
February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January
February 2026 saw a 43% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 13 vulnerabilities requiring immediate remediation, down from 23 in January 2026. All 13 carried a ‘Very Critical’ Recorded Future Risk Score.
What security teams need to know:
Microsoft dominates: Six of 13 vulnerabilities affected Microsoft products, accounting for 46% of February's findings; all were added to CISA's KEV catalog on the same day
0
2 👁
Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence
Key Takeaways
Latin America faces a distinct and evolving cyber threat landscape, from PIX payment fraud to ransomware hitting critical infrastructure.
Most LATAM security teams are still reactive by necessity, and that posture is costing organizations in downtime, data, and trust.
Recorded Future offers LATAM-specific threat intelligence, automation, and 100+ integrations to help stretched teams get ahead of attacks before they land.
Meet us at R
0
2 👁
Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA
Recorded Future is expanding its payment fraud prevention capabilities through a partnership with CYBERA, the industry leader in detecting and verifying data on scam-linked bank accounts.
Available for purchase now via the Recorded Future Platform, Money Mule Intelligence helps fraud teams identify the accounts criminals use to extract and move stolen funds—addressing a critical gap as scams increasingly become banks' most pressing fraud challenge.
The Growing Threat of Authorize
0
2 👁
January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day
January 2026 saw a modest 5% increase in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 23 vulnerabilities requiring immediate remediation, up from 22 in December 2025. Noteworthy trends last month included Russian state-sponsored exploitation of a Microsoft Office zero-day and critical authentication bypass flaws affecting enterprise infrastructure.
What security teams need to know:
APT28's Operation Neusploit: Russian state-sponsored ac
0
2 👁
Preparing for Russia’s New Generation Warfare in Europe
Executive Summary
Since its full-scale invasion of Ukraine in February 2022, Russia has waged what we assess is largely opportunistic, though increasingly aggressive, hybrid warfare in NATO territory. Moscow has very likely not yet leveraged its full capability to integrate cyber, political, and sabotage tools into a full-scale campaign.
Over the next two years, Russian President Vladimir Putin will likely escalate Russia’s hybrid warfare campaign against NATO members into a full
0
2 👁
2025 Cloud Threat Hunting and Defense Landscape
Executive Summary
Insikt Group has observed continued trends of growth and increased activity of threat actors leveraging and exploiting cloud infrastructure to broaden the number of victims they target and infect. Recent reporting across the observed incidents shows that cloud-focused threats are converging on a few consistent patterns, which serve as the main sections of this report:
Exploitation and Misconfiguration
Cloud Abuse
Cloud Ransomware
0
2 👁
GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack
Executive Summary
Insikt Group has been monitoring GrayCharlie, a threat actor overlapping with SmartApeSG and active since mid-2023, for some time, and is now publishing its first report on the group. GrayCharlie compromises WordPress sites and injects them with links to externally hosted JavaScript that redirects visitors to NetSupport RAT payloads delivered via fake browser update pages or ClickFix mechanisms. These infections often progress to the deployment of Stealc and SectopRAT.
0
1 👁
Network Intelligence: Your Questions, Global Answers
The Problem with Pre-Packaged Intelligence
Security teams are drowning in threat intelligence feeds. Hundreds of vendors promise comprehensive coverage, real-time alerts, and actionable insights. Yet sophisticated adversaries continue to operate undetected, incidents take weeks to scope, and attribution remains elusive.
The fundamental issue isn't quality but control. Traditional network visibility solutions force passive consumption: their alerts, their priorities, their timelin
0
1 👁
State of Security Report | Recorded Future
Fragmentation is the new normal
The global threat landscape didn't simplify in 2025—it shattered. Geopolitical alliances strained. Criminal enterprises splintered and regrouped. State-sponsored actors shifted from dramatic disruptions to quiet pre-positioning. And as long-established norms unwound, convergence across once-distinct domains created unprecedented uncertainty.
The 2026 State of Security report delivers Insikt Group's most comprehensive annual analysis of
0
2 👁
Fragmentation Defined 2025's Threat Landscape. Here's What It Means for 2026
Uncertainty has become the operating environment for business. And this year, fragmentation is driving it.
The global threat landscape didn't simplify in 2025; it shattered. Geopolitical alliances strained. Criminal enterprises splintered under law enforcement pressure, then regrouped into smaller, faster, and harder-to-track operations. State-sponsored cyber actors shifted from dramatic disruptions to quiet pre-positioning, embedding themselves in networks and waiting. Hacktivist groups
0
2 👁
From 27 Steps to 5: How Recorded Future Reimagined Threat Hunting with Autonomous Threat Operations
The manual operations gap can be a business risk
Manual threat hunting requires 27 steps that burn analyst time
Autonomous Threat Operations can reduce 27 steps to 5
Autonomous operations prove measurable ROI
0
3 👁
Rublevka Team: Anatomy of a Russian Crypto Drainer Operation
Executive Summary
Insikt Group has identified a major cybercriminal operation specializing in large-scale cryptocurrency theft, operating under the moniker “Rublevka Team”. Since its inception in 2023, the threat group has generated over $10 million through affiliate-driven wallet draining campaigns. Rublevka Team is an example of a “traffer team,” composed of a network of thousands of social engineering specialists tasked with directing victim traffic to malicious pages. Unlike traditio
0
2 👁
Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team | Recorded Future
Key Takeaways:
Recorded Future deployed Autonomous Threat Operations within its own SOC before customer release, ensuring real-world effectiveness and identifying critical capabilities.
Autonomous Threat Operations reduced analyst-dependent, inconsistent processes, creating standardized hunts that deliver the same input, output, and expectations every time.
Team members now run 15-20 threat hunts weekly—work that previously required days or weeks of manual
0
2 👁