Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Recorded Future Releases Free Threat Intelligence Browser Extension

Recorded Future this week announced the availability of Express, a free web browser extension designed to help security teams prioritize vulnerability patching and alerts from security information and event management (SIEM) tools.

Recorded Future this week announced the availability of Express, a free web browser extension designed to help security teams prioritize vulnerability patching and alerts from security information and event management (SIEM) tools.

The extension is currently available for Chrome and Firefox, and once it’s installed an icon with the Recorded Future logo will be added to the browser’s toolbar. Users will have to provide a business email address, set a password for their account, and agree to the extension collecting data from the web pages they visit.

Once the extension is enabled, clicking its icon will display information about the hashes, vulnerabilities, IPs, and domains found on the current web page. Additional information can be obtained for each category and users can enable an option that displays risk scores directly on the page next to each piece of relevant information.

Recorded Future Express can provide information about the indicators from nearly any type of website or technology, including SIEM and other web-based tools and resources.

“Instead of opening multiple browser tabs and pivoting between them to collect and analyze data manually, Express does the work for you. Simply click on the indicator you want to explore on any webpage or tool — including SIEMs, vulnerability scans, malware analysis reports, security blogs, emails, and more,” Recorded Future explained in a blog post.

“View real-time risk scores directly on the page to confidently prioritize high-risk indicators. You can also access relevant risk information instantly. For example, you can immediately find out whether or not an IP is a current command-and-control (C2) server,” it added.

Recorded Future Express

Express uses data from Recorded Future’s commercial platform, and the company claims it’s the only threat intelligence provider to openly offer access to its data.

Threat intelligence firm Anomali also offers a similar browser extension, but its product is part of the company’s Altitude solution and is only available to Anomali customers.

Related: Recorded Future Adds Third-Party Risk to Threat Intelligence Platform

Related: Microsoft Introduces Free Source Code Analyzer

Related: Free Security Tools, Resources Offered During Coronavirus Outbreak

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Threat Intelligence

How threat intelligence is critical when justifying budget for GRC personnel, and for threat intelligence, incident response, security operations and CISO buyers.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.

Risk Management

A threat-based approach to security often focuses on a checklist to meet industry requirements but overlooked the key component of security: reducing risk.