{"id":9885,"date":"2022-11-09T17:46:54","date_gmt":"2022-11-09T09:46:54","guid":{"rendered":"https:\/\/cybersecthreat.com\/?post_type=product&#038;p=9885"},"modified":"2026-03-07T02:24:45","modified_gmt":"2026-03-06T18:24:45","slug":"recorded-future","status":"publish","type":"product","link":"https:\/\/cybersecthreat.com\/zh\/product\/recorded-future\/","title":{"rendered":"Recorded Future \u5a01\u8105\u60c5\u8cc7\u96f2\u7aef\u5e73\u53f0"},"content":{"rendered":"<p>Recorded Future Intelligence Cloud is the world&#8217;s most advanced threat intelligence platform, and the first CTI player integrated with OpenAI GPT that empowers organizations to proactively identify, analyze, and respond to emerging cyber threats. With its cutting-edge AI and machine learning capabilities, the platform enables users to access real-time insights and analysis on a vast range of data sources, including public sources, technical sources, dark web, deep web, underground forums, special access sites, instant messaging group used by criminals, code repositories, paste sites, Proprietary Threat feeds and intelligence from its own research and analysis team. This provides organizations with the actionable intelligence they need to mitigate risks and enhance their cybersecurity posture.<\/p>\n<p>Recorded Future is designed to help organizations stay ahead of emerging threats and prevent cyber-attacks. Its intuitive user interface enables users to access relevant information, including threat actors, indicators of compromise, and vulnerability data quickly and easily. With this information at their fingertips, security teams can take proactive measures to defend their networks against potential threats.<\/p>\n<p>Recorded Future can benefit a wide range of organizations, including intelligence agencies, Military Departments, National Security Agencies, National Defense, Homeland Security Agencies, Criminal investigations, Public Security, government agencies, the financial services industry, the Semiconductors industry, the manufacturing industry, critical infrastructure providers, Telecommunications (Telecom), Energy industry, CERT, ISAC, SOC (Security Operation Center) and Online Service Provider (E.g. Any Cloud Service provider and consumer, Virtual Bank, Gaming industry, Cryptocurrency Exchange, NFT &amp; Metaverse). It can help these organizations identify and assess threats, prioritize vulnerabilities, and respond quickly to potential attacks. By leveraging Recorded Future&#8217;s comprehensive threat intelligence capabilities, organizations can strengthen their overall security posture and protect their sensitive data and assets.<\/p>\n<p>Recorded Future offers 9 modules, each with its own unique set of features, capabilities, and use cases:<\/p>\n<ul>\n<li><strong><a class=\"text-sm hover:text-blue\" href=\"https:\/\/www.recordedfuture.com\/platform\/threat-intelligence\" target=\"_self\" rel=\"noreferrer noopener\">Threat Intelligence<\/a><\/strong>: Provides real-time insights and analysis on emerging cyber threats, including threat actors, Indicators of Compromise (IoC), dark web marketplaces, detects C2 outgoing connection, and malware analysis\/reversing via Hatching sandbox. The Threat Intelligence module supports various use cases including Criminal Investigation, understanding the threat landscape, trends of Cyber Attacks\/Cyber Warfare\/Semiconductors\/5G\/IoT\/Smart Cities\/Electric Vehicles, and the latest TTP used by Criminals. [<a href=\"https:\/\/go.recordedfuture.com\/hubfs\/data-sheets\/threat-intelligence.pdf\" target=\"_blank\" rel=\"noopener\">Datasheet<\/a>]<\/li>\n<li><strong><a class=\"text-sm hover:text-blue\" href=\"https:\/\/www.recordedfuture.com\/platform\/secops-intelligence\" target=\"_self\" rel=\"noreferrer noopener\">SecOps Intelligence<\/a><\/strong>: Helps security operations teams prioritize and respond to security incidents by providing context and insights into potential threats. [<a href=\"https:\/\/go.recordedfuture.com\/hubfs\/data-sheets\/secops-intelligence-module.pdf\" target=\"_blank\" rel=\"noopener\">Datasheet<\/a>]<\/li>\n<li><strong><a class=\"text-sm hover:text-blue\" href=\"https:\/\/www.recordedfuture.com\/platform\/geopolitical-intelligence\" target=\"_self\" rel=\"noreferrer noopener\">Geopolitical Intelligence<\/a><\/strong>: Provides insights into global or localized events and trends that can impact an organization&#8217;s physical assets, human safety, normal business operations, and even goods delivery, including Protests, Military activities, Crime and Violence, Political, Election, Terrorism, and Natural Disasters. For the public sector, Geopolitical Intelligence supports monitoring of Cyber Influence Operations, Influencing voting campaigns, Disinformation, foreign military activity, counterterrorism issues, foreign investment, and chatter about your forces [<a href=\"https:\/\/go.recordedfuture.com\/hubfs\/data-sheets\/geopolitical-intelligence-module.pdf\" target=\"_blank\" rel=\"noopener\">Datasheet<\/a>]<\/li>\n<li><a class=\"text-sm hover:text-blue\" href=\"https:\/\/www.recordedfuture.com\/platform\/third-party-intelligence\" target=\"_self\" rel=\"noreferrer noopener\"><strong>Third-Party Intelligence<\/strong><\/a>: Monitors third-party vendors and partners for potential security risks, vulnerabilities, and dark web data leakage. [<a href=\"https:\/\/go.recordedfuture.com\/hubfs\/data-sheets\/third-party-intelligence.pdf\" target=\"_blank\" rel=\"noopener\">Datasheet<\/a>]<\/li>\n<li><strong><a class=\"text-sm hover:text-blue\" href=\"https:\/\/www.recordedfuture.com\/platform\/vulnerability-intelligence\" target=\"_self\" rel=\"noreferrer noopener\">Vulnerability Intelligence<\/a><\/strong>: Identifies and prioritizes vulnerabilities (including Pre-NVD) that could be exploited by cybercriminals, enabling organizations to take proactive measures to mitigate risks. [<a href=\"https:\/\/go.recordedfuture.com\/hubfs\/data-sheets\/vulnerability-intelligence.pdf\" target=\"_blank\" rel=\"noopener\">Datasheet<\/a>]<\/li>\n<li><a class=\"text-sm hover:text-blue\" href=\"https:\/\/www.recordedfuture.com\/platform\/brand-intelligence\" target=\"_self\" rel=\"noreferrer noopener\"><strong>Brand Intelligence<\/strong><\/a>: Helps organizations monitor and protect their brand reputation by identifying and analyzing online mentions (including becoming Cyber Attack targets, complaints, and Service Disruptions), data leakage (E.g. AWS Key leakage), Phishing Websites, Fake Apps, Executive Impersonation on Social Media) and confidential data auction from various sources including the dark web. Optional take-down services can assist organizations to take down Phishing Websites, Fake Apps, and Executive Impersonation on Social Media. [<a href=\"https:\/\/go.recordedfuture.com\/hubfs\/data-sheets\/brand-intelligence-module.pdf\" target=\"_blank\" rel=\"noopener\">Datasheet<\/a>]<\/li>\n<li><strong><a class=\"text-sm hover:text-blue\" href=\"https:\/\/www.recordedfuture.com\/platform\/identity-intelligence\" target=\"_self\" rel=\"noreferrer noopener\">Identity Intelligence<\/a><\/strong>: Enables organizations to detect and prevent identity fraud by monitoring identity leakage activity related to their employees, customers, and partners. [<a href=\"https:\/\/go.recordedfuture.com\/hubfs\/partners\/Campaigns\/identity-intelligence-module.pdf\" target=\"_blank\" rel=\"noopener\">Datasheet<\/a>]<\/li>\n<li><strong><a class=\"text-sm hover:text-blue\" href=\"https:\/\/www.recordedfuture.com\/platform\/attack-surface-intelligence\" target=\"_self\" rel=\"noreferrer noopener\">Attack Surface Intelligence<\/a><\/strong>: This helps organizations understand their digital attack surface and identify its shadow digital assets, potential vulnerabilities, and misconfigurations. [<a href=\"https:\/\/go.recordedfuture.com\/hubfs\/data-sheets\/attack-surface-intelligence.pdf\" target=\"_blank\" rel=\"noopener\">Datasheet<\/a>]<\/li>\n<li><strong><a class=\"text-sm hover:text-blue\" href=\"https:\/\/www.recordedfuture.com\/platform\/payment-fraud-intelligence\" target=\"_self\" rel=\"noreferrer noopener\">Payment Fraud Intelligence<\/a><\/strong>: Provides insights into potential payment fraud schemes, including carding and account takeover.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>By offering a range of intelligence modules, Recorded Future enables organizations to customize their threat intelligence program to meet their specific needs and priorities. This allows them to focus on the areas of greatest risk and allocate their resources and budget more effectively.<\/p>\n<p>&nbsp;<\/p>\n<blockquote><p>Cyber Threat intelligence (CTI) is one of the key sources to determine the budget of your cybersecurity program, the military department cannot judge the budget without the intelligence of our enemies. The most common misconception towards threat intelligence in the cyber industry is it must be accurate. We will never know whether it is accurate if we don&#8217;t even know the existence of that information.<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>Check out CIO Taiwan&#8217;s interview about Recorded Future:<\/p>\n<p><a href=\"https:\/\/cybersecthreat.com\/2023\/03\/06\/cybersecthreat-introduces-recorded-future-to-taiwan\/\">https:\/\/cybersecthreat.com\/2023\/03\/06\/cybersecthreat-introduces-recorded-future-to-taiwan\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u904b\u7528\u5a01\u8105\u60c5\u8cc7\u4f86\u5b88\u8b77\u4e16\u754c<\/p>","protected":false},"featured_media":9896,"template":"","meta":{"om_disable_all_campaigns":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_kad_post_transparent":"default","_kad_post_title":"","_kad_post_layout":"default","_kad_post_sidebar_id":"","_kad_post_content_style":"default","_kad_post_vertical_padding":"default","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":""},"product_brand":[],"product_cat":[271,266],"product_tag":[338,268,267,214,339,217],"class_list":{"0":"post-9885","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-cyber-threat-intelligence","7":"product_cat-cybersecurity","8":"product_tag-ai","9":"product_tag-cti","10":"product_tag-cyber-threat-intelligence","11":"product_tag-cybersecurity","12":"product_tag-gpt","13":"product_tag-soc","15":"first","16":"instock","17":"taxable","18":"shipping-taxable","19":"purchasable","20":"product-type-simple","21":"entry","22":"content-bg","23":"loop-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Recorded Future Intelligence Cloud - CyberSecThreat<\/title>\n<meta name=\"description\" content=\"Recorded Future Intelligence Cloud is an advanced threat intelligence platform can proactively identify, analyze, and respond to emerging cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersecthreat.com\/zh\/\u7522\u54c1\/recorded-future\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recorded Future Intelligence Cloud\" \/>\n<meta property=\"og:description\" content=\"Securing our world with threat intelligence\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersecthreat.com\/zh\/\u7522\u54c1\/recorded-future\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSecThreat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybersecthreat\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-06T18:24:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2022\/11\/Recorded_Future_logo-e1668070824318.png\" \/>\n\t<meta property=\"og:image:width\" content=\"228\" \/>\n\t<meta property=\"og:image:height\" content=\"230\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:label1\" content=\"Price\" \/>\n\t<meta name=\"twitter:data1\" content=\"&#078;&#084;&#036;9,999,999.00\" \/>\n\t<meta name=\"twitter:label2\" content=\"Availability\" \/>\n\t<meta name=\"twitter:data2\" content=\"In stock\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/\",\"name\":\"Recorded Future Intelligence Cloud - CyberSecThreat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Recorded_Future_logo-e1668070824318.png\",\"datePublished\":\"2022-11-09T09:46:54+00:00\",\"dateModified\":\"2026-03-06T18:24:45+00:00\",\"description\":\"Recorded Future Intelligence Cloud is an advanced threat intelligence platform can proactively identify, analyze, and respond to emerging cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Recorded_Future_logo-e1668070824318.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Recorded_Future_logo-e1668070824318.png\",\"width\":228,\"height\":230,\"caption\":\"Recorded Future logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"SHOP\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/shop\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/product-category\\\/products\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CyberSecurity\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/product-category\\\/products\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Threat Intelligence\",\"item\":\"https:\\\/\\\/cybersecthreat.com\\\/product-category\\\/products\\\/cybersecurity\\\/cyber-threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Recorded Future Intelligence Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"name\":\"CyberSecThreat\",\"description\":\"CyberSecurity Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybersecthreat.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\",\"name\":\"CyberSecThreat Corporation Limited.\",\"alternateName\":\"CyberSecThreat\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cybersecthreat\",\"https:\\\/\\\/x.com\\\/cybersecthreat\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybersecthreat-corporation-limited\"],\"description\":\"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\\\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\\\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.\",\"legalName\":\"CyberSecThreat Corporation Limited.\",\"foundingDate\":\"2021-01-23\",\"address\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"25.0600452\",\"longitude\":\"121.4594381\"},\"telephone\":[\"(+886) 02 - 77527628\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"}],\"email\":\"info@cybersecthreat.com\",\"areaServed\":\"Taiwan\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/#local-main-place-address\",\"streetAddress\":\"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)\",\"addressLocality\":\"New Taipei City\",\"postalCode\":\"242032\",\"addressRegion\":\"Taiwan\",\"addressCountry\":\"TW\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/product\\\/recorded-future\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"width\":164,\"height\":164,\"caption\":\"CyberSecThreat Corporation Limited.\"}]}<\/script>\n<meta property=\"product:price:amount\" content=\"9999999.00\" \/>\n<meta property=\"product:price:currency\" content=\"TWD\" \/>\n<meta property=\"og:availability\" content=\"instock\" \/>\n<meta property=\"product:availability\" content=\"instock\" \/>\n<meta property=\"product:condition\" content=\"new\" \/>\n<meta name=\"geo.placename\" content=\"New Taipei City\" \/>\n<meta name=\"geo.position\" content=\"25.0600452;121.4594381\" \/>\n<meta name=\"geo.region\" content=\"Taiwan\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"RECORDED FUTURE \u5a01\u8105\u60c5\u8cc7\u5e73\u53f0 - \u5947\u8cc7\u5b89","description":"Recorded Future Intelligence Cloud is an advanced threat intelligence platform can proactively identify, analyze, and respond to emerging cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersecthreat.com\/zh\/\u7522\u54c1\/recorded-future\/","og_locale":"zh_TW","og_type":"article","og_title":"Recorded Future Intelligence Cloud","og_description":"Securing our world with threat intelligence","og_url":"https:\/\/cybersecthreat.com\/zh\/\u7522\u54c1\/recorded-future\/","og_site_name":"CyberSecThreat","article_publisher":"https:\/\/www.facebook.com\/cybersecthreat","article_modified_time":"2026-03-06T18:24:45+00:00","og_image":[{"width":228,"height":230,"url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2022\/11\/Recorded_Future_logo-e1668070824318.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@cybersecthreat","twitter_misc":{"Price":"&#78;&#84;&#36;9,999,999.00","Availability":"In stock"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["WebPage","ItemPage"],"@id":"https:\/\/cybersecthreat.com\/product\/recorded-future\/","url":"https:\/\/cybersecthreat.com\/product\/recorded-future\/","name":"RECORDED FUTURE \u5a01\u8105\u60c5\u8cc7\u5e73\u53f0 - \u5947\u8cc7\u5b89","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersecthreat.com\/product\/recorded-future\/#primaryimage"},"image":{"@id":"https:\/\/cybersecthreat.com\/product\/recorded-future\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2022\/11\/Recorded_Future_logo-e1668070824318.png","datePublished":"2022-11-09T09:46:54+00:00","dateModified":"2026-03-06T18:24:45+00:00","description":"Recorded Future Intelligence Cloud is an advanced threat intelligence platform can proactively identify, analyze, and respond to emerging cyber threats.","breadcrumb":{"@id":"https:\/\/cybersecthreat.com\/product\/recorded-future\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersecthreat.com\/product\/recorded-future\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/product\/recorded-future\/#primaryimage","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2022\/11\/Recorded_Future_logo-e1668070824318.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2022\/11\/Recorded_Future_logo-e1668070824318.png","width":228,"height":230,"caption":"Recorded Future logo"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersecthreat.com\/product\/recorded-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"SHOP","item":"https:\/\/cybersecthreat.com\/shop\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/cybersecthreat.com\/product-category\/products\/"},{"@type":"ListItem","position":3,"name":"CyberSecurity","item":"https:\/\/cybersecthreat.com\/product-category\/products\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyber Threat Intelligence","item":"https:\/\/cybersecthreat.com\/product-category\/products\/cybersecurity\/cyber-threat-intelligence\/"},{"@type":"ListItem","position":5,"name":"Recorded Future Intelligence Cloud"}]},{"@type":"WebSite","@id":"https:\/\/cybersecthreat.com\/#website","url":"https:\/\/cybersecthreat.com\/","name":"\u5947\u8cc7\u5b89","description":"\u7db2\u8def\u5b89\u5168\u65b9\u6848","publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersecthreat.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":["Organization","Place"],"@id":"https:\/\/cybersecthreat.com\/#organization","name":"\u5947\u8cc7\u8a0a\u4fdd\u5b89\u53ca\u7db2\u7d61\u6709\u9650\u516c\u53f8","alternateName":"CyberSecThreat","url":"https:\/\/cybersecthreat.com\/","logo":{"@id":"https:\/\/cybersecthreat.com\/product\/recorded-future\/#local-main-organization-logo"},"image":{"@id":"https:\/\/cybersecthreat.com\/product\/recorded-future\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/cybersecthreat","https:\/\/x.com\/cybersecthreat","https:\/\/www.linkedin.com\/company\/cybersecthreat-corporation-limited"],"description":"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.","legalName":"CyberSecThreat Corporation Limited.","foundingDate":"2021-01-23","address":{"@id":"https:\/\/cybersecthreat.com\/product\/recorded-future\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"25.0600452","longitude":"121.4594381"},"telephone":["(+886) 02 - 77527628"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"18:00"}],"email":"info@cybersecthreat.com","areaServed":"Taiwan"},{"@type":"PostalAddress","@id":"https:\/\/cybersecthreat.com\/product\/recorded-future\/#local-main-place-address","streetAddress":"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)","addressLocality":"New Taipei City","postalCode":"242032","addressRegion":"Taiwan","addressCountry":"TW"},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/product\/recorded-future\/#local-main-organization-logo","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","width":164,"height":164,"caption":"CyberSecThreat Corporation Limited."}]},"product_price_amount":"9999999.00","product_price_currency":"TWD","og_availability":"instock","product_availability":"instock","product_condition":"new","geo.placename":"New Taipei City","geo.position":{"lat":"25.0600452","long":"121.4594381"},"geo.region":"Taiwan"},"taxonomy_info":{"product_cat":[{"value":271,"label":"Cyber Threat Intelligence"},{"value":266,"label":"CyberSecurity"}],"product_tag":[{"value":338,"label":"AI"},{"value":268,"label":"CTI"},{"value":267,"label":"Cyber Threat intelligence"},{"value":214,"label":"CyberSecurity"},{"value":339,"label":"GPT"},{"value":217,"label":"SOC"}]},"featured_image_src_large":["https:\/\/cybersecthreat.com\/wp-content\/uploads\/2022\/11\/Recorded_Future_logo-e1668070824318.png",228,230,false],"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/product\/9885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media\/9896"}],"wp:attachment":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media?parent=9885"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/product_brand?post=9885"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/product_cat?post=9885"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/product_tag?post=9885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}