# www.recordedfuture.com > AI-optimized mirror of www.recordedfuture.com containing 48 pages totalling 50,949 words of clean markdown content, structured data, and semantic HTML. Original source: https://www.recordedfuture.com/. Last updated: 2026-04-14T00:11:01.269Z. Each page is available as HTML (with JSON-LD structured data) and Markdown (text-only, ideal for LLMs and RAG). ## Homepage - [Take our free assessment to reveal your maturity stage and get recommended steps to level up your program.](/site-root.html): Get real-time, actionable cyber threat intelligence with Recorded Future. Mitigate cyber risks, prioritize threats, and proactively secure your business. (897 words) ## Articles & Blog Posts - [sitemap-index-xml.html](/sitemap-index-xml.html) (1 words) - [sitemap-main-xml.html](/sitemap-main-xml.html) (1 words) - [sitemap-vuln-1-xml.html](/sitemap-vuln-1-xml.html) (1 words) - [Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling](/research/chinese-group-tag-22-targets-nepal-philippines-taiwan.html): Recorded Future has identified a suspected Chinese state-sponsored group that we track as TAG-22 targeting Nepal, the Philippines, and Taiwan. (1,311 words) - [ClickFix Campaigns Targeting Windows and macOS](/research/clickfix-campaigns-targeting-windows-and-macos/index.html): Insikt Group reveals five ClickFix social engineering clusters (QuickBooks, Booking.com, Birdeye) targeting Windows and macOS. Learn how threat actors exploit native system tools with malicious, obfuscated commands to gain initial access, and get key mitigations for defense (6,198 words) - [CVE-2019-19781](/vulnerability-database/cve-2019-19781/index.html): CVE-2019-19781 is a vulnerability affecting Citrix Application Delivery Controller (ADC) and Gateway versions 10.5, 11.1, 12.0, 12.1, and 13.0. This issue enables an attacker to ... (123 words) - [CVE-2020-1472](/vulnerability-database/cve-2020-1472/index.html): CVE-2020-1472 is an elevation of privilege vulnerability that allows unauthenticated attackers to establish a vulnerable Netlogon secure channel connection to a domain controller using the ... (160 words) - [CVE-2024-1709](/vulnerability-database/cve-2024-1709/index.html): CVE-2024-1709 is a newly disclosed vulnerability affecting ConnectWise ScreenConnect versions 23.9.7 and older. This issue involves an Authentication Bypass vulnerability, enabling attackers to bypass the ... (118 words) - [CVE-2024-3400](/vulnerability-database/cve-2024-3400/index.html): CVE-2024-3400 is a critical command injection vulnerability affecting specific versions and configurations of Palo Alto Networks PAN-OS software's GlobalProtect feature. An unauthenticated attacker can exploit ... (111 words) - [February 2026 CVE Landscape:13 Critical Vulnerabilities Mark 43% Drop from January](/blog/february-2026-cve-landscape/index.html): February 2026 saw a 43% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 13 vulnerabilities requiring immediate remediation, down from 23 in January 2026. (2,159 words) - [Inside the Scam: North Korea’s IT Worker Threat](/research/inside-the-scam-north-koreas-it-worker-threat/index.html): Learn how North Korea’s IT workers infiltrate global companies, posing cybersecurity threats, committing fraud, and supporting the regime. Discover key findings and mitigation strategies to safeguard your business. (2,572 words) - [January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day](/blog/january-2026-cve-landscape/index.html): January 2026 saw 23 actively exploited CVEs, including APT28’s Microsoft Office zero-day and critical auth bypass flaws impacting enterprise systems. (1,967 words) - [Managing the Unseen: Shadow IT and Its Security Risks](/blog/managing-unseen-shadow-it/index.html): Attack surfaces continue to grow as cloud computing expands, and as employees rely on access points and devices beyond the IT department's oversight. Having a comprehensive view of your organization's attack surface – and all the shadow IT – helps you identify, protect, detect, and respond to these unseen threats. (1,149 words) - [Oops! Looks like you're lost.](/get-started/explore-demo-center/index.html) (46 words) - [Original Equipment Manufacturer Program](/partner/oem/index.html) (226 words) - [Privacy policy](/legal/privacy-policy/index.html): View the most recent <a href="/privacy-policy/3/">archived version</a>. (4,165 words) - [Product Updates: List Building and Search Tools Plus Improved Balance to Results](/blog/product-updates-list-building-and-search-tools-plus-improved-balance-to-results.html): We have two major updates to share this week: lists and improved balance to the results returned on high volume queries. All of the details and examples of each update can be found below, and when you’re ready, log in and try out the latest! (484 words) - [The Maturity Gap: The Next Frontier in Threat Intelligence](/blog/maturity-gap-next-frontier-in-threat-intelligence/index.html): Learn what advanced threat intelligence maturity really means and how to close the gap between current capabilities and predictive, autonomous operations. (1,224 words) - [Understanding and Anticipating Venezuelan Government Actions](/research/understanding-and-anticipating-venezuelan-government-actions.html): Explore an in-depth analysis of Venezuela’s political landscape following the January 2026 US operation to capture Nicolás Maduro. This executive summary examines Acting President Delcy Rodríguez’s transition strategy, her pragmatic re-engagement with Washington, and the internal threats posed by PSUV rivals like Diosdado Cabello. Gain insights into the "three-phase" US plan for stabilization, the 2026 Organic Hydrocarbons Law reforms, and the outlook for economic recovery versus the existential threat of competitive elections. Essential intelligence for organizations monitoring Latin American geopolitical risk and energy sector investments. (7,449 words) - [WhisperGate Malware Corrupts Computers in Ukraine](/research/whispergate-malware-corrupts-computers-ukraine/index.html): WhisperGate is a new malware family being used in an ongoing operation targeting multiple industries in Ukraine. (1,946 words) - [Datasheet](/resources/guides/third-party-risk/index.html): Detect third-party cyber threats before they disrupt business operations, expose data, or damage trust. (88 words) - [Datasheet](/resources/guides/mitigate-supply-chain-risk/index.html) (75 words) - [Datasheet](/resources/guides/autonomous-threat-operations/index.html): Manual cyber operations trap security teams in endless reactive cycles—with analysts spending up to 70% of their time on alert triage and 2-4 hours manually correlating threat data per incident. (106 words) - [eBook](/resources/guides/threat-hunt-e-book-2026/index.html): Discover how to move from manual bottlenecks to 24/7 autonomous defense. (111 words) - [Infographic](/resources/guides/infographic-state-of-threat-intelligence/index.html): Threat intelligence is mission-critical. (35 words) - [Report](/resources/guides/state-of-security-2026/index.html): Explore the intelligence from Recorded Future's Insikt Group annual threat landscape analysis: the definitive report on how geopolitical fragmentation, state-sponsored operations, and criminal ecosystem evolution are reshaping global risk. (99 words) - [Report](/resources/guides/h1-2025-check-fraud-report/index.html): New Stolen Check Volume High Despite Telegram’s 2024 Agreement to Share User Data with Law Enforcement. (130 words) - [Report](/resources/guides/2025-state-of-threat-intelligence/index.html) (160 words) - [Top 15 OSINT Tools for Expert Intelligence Gathering](/threat-intelligence-101/tools-and-technologies/osint-tools/index.html): Explore our list of the top 15 OSINT tools to collect data from open sources to enhance intelligence, security, and investigation efforts (3,087 words) - [What is Third Party Cyber Risk Management?](/threat-intelligence-101/risk-assessment-management/third-party-risk-management/index.html): Third party cyber risk management identifies and removes cybersecurity risks that vendors and partners bring into your company's IT environment. Learn more. (3,107 words) - [What is Threat Intelligence Management?](/threat-intelligence-101/integrations/threat-intelligence-management/index.html): Threat intelligence management systematically collects, analyzes, and shares detailed info on emerging cyber threats and risks to organizations. Learn more (2,125 words) - [Whitepaper](/resources/guides/the-convergence-of-space-and-cyber/index.html) (116 words) - [Whitepaper](/resources/guides/recorded-future-threat-actor-and-malware-taxonomy/index.html) (152 words) - [サイバーセキュリティと生産性の向上:Recorded Futureの脅威インテリジェンスによって効率化され、ROIが向上する仕組み](/jp/blog/improving-cybersecurity-productivity-threat-intelligence-recorded-future-drives-roi.html): Recorded Futureがサイバーセキュリティ担当チームの生産性を向上する方法をご覧ください。脅威インテリジェンスで週間100時間以上削減し、年間29万ドルを創出します。 (379 words) ## Listings & Categories - [Book a custom demo.](/get-started/index.html): Book a demo or explore our free resources to see how Recorded Future can address your security needs with tailored threat intelligence solutions. (423 words) - [Intelligence Platform](/platform/index.html): Discover the AI-driven Recorded Future Intelligence Platform. Mitigate threats with real-time insights, integrations, and actionable intelligence. (714 words) - [Resources](/resources/index.html): Beyond threat intelligence products, Recorded Future offers deep research and expert insights to help security teams stay one step ahead of attackers. (641 words) - [Automate](/use-case/automation-security-workflows/index.html): Automate investigations, enrich alerts with context, and integrate threat intelligence into your tools to boost SOC efficiency and reduce risks. (893 words) - [Critical Infrastructure](/industry/critical-infrastructure/index.html): Defend critical infrastructure from targeted attacks. Mitigate risks and protect vital infrastructure services with real-time intelligence and proactive threat detection. (701 words) - [Cyber Operations](/products/cyber-operations/index.html): Anticipate, prevent, and disrupt threats proactively. Hunt, detect, and respond autonomously. (917 words) - [Demo Center](/platform/demo-center/index.html): Discover Recorded Future's powerful products and use cases in our Demo Center to find tailored threat intelligence solutions to meet your security needs. (342 words) - [Digital Risk Protection](/use-case/digital-risk/index.html): Monitor for brand threats, compromised credentials, and data leaks with Recorded Future’s real-time intelligence and unified investigative tools. (1,347 words) - [Insikt Group® Research](/research/insikt-group/index.html): Explore Insikt Group’s expert-driven research on cybercrime, state-sponsored threats, and global issues. Gain actionable insights for security. (624 words) - [Intelligence news and research wherever you need it.](/platform/mobile-app/index.html) (323 words) - [Malware detection](/why-recorded-future/malware-detection-and-response/index.html): Discover Recorded Future advanced malware detection that leverages analysis, automation, and context for faster and more accurate threat response. (1,037 words) - [Recorded Future AI](/platform/recorded-future-ai/index.html): Discover how Recorded Future AI enhances intelligence. Reduce analyst workloads, speed up threat detection, and create comprehensive reports effortlessly. (781 words) - [Reports and guides](/resources/guides/index.html) (128 words) ## Resources - [Full Page Index](/index.html): Browse all cached pages with rich metadata - [About This Cache](/about.html): Methodology, technical details, and usage guidelines - [XML Sitemap](/sitemap.xml): Machine-readable sitemap for crawler discovery - [Robots.txt](/robots.txt): Crawler directives