What Is Open Source Intelligence: The Importance of OSINT in Your...
Blogs What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape In order to gain the upper hand, security strategies must include a diverse means of gathering...
View ArticleWhy We Acquired Echosec Systems: The OSINT Revolution
Blogs Blog Why We Acquired Echosec Systems: The OSINT Revolution Flashpoint CEO Josh Lefkowitz on the Echosec acquisition and the proven, foundational importance of open source intelligence SHARE...
View Article5 Reasons Taiwan Is a Growing Source of US-China Tension
Blogs Blog 5 Reasons Taiwan Is a Growing Source of US-China Tension Five key indicators that may represent current and future escalations in US-China tensions related to Taiwan. SHARE THIS:...
View ArticleFlashpoint in 2023: A Note From Our CEO
Blogs Blog Flashpoint in 2023: A Note From Our CEO How Flashpoint will improve, innovate, and inspire in 2023 SHARE THIS: Josh Lefkowitz January 12, 2023 Table Of ContentsTable of ContentsHarnessing...
View ArticleCard Shop Threat Landscape: BidenCash Dumps 2.1M Stolen Credit Cards
Blogs Blog Card Shop Threat Landscape: BidenCash Dumps 2.1M Stolen Credit Cards What we know about the most recent BidenCash dump, and what it means in the context of the greater card shop threat...
View ArticleRisk Intelligence Index: Cyber Threat Landscape by the Numbers
Blogs Blog Risk Intelligence Index: Cyber Threat Landscape by the Numbers Flashpoint’s monthly look at the cyber risk ecosystem affecting organizations around the world, including intelligence, news,...
View ArticleThe Risk-Reducing Power of Flashpoint Video Search
Blogs Blog The Risk-Reducing Power of Flashpoint Video Search An essential investigative component, Flashpoint’s industry-first video search technology surfaces logos, text, explicit content, and...
View ArticleWhy We Built Flashpoint Ignite: Unity, Power, and Performance
Blogs Blog Why We Built Flashpoint Ignite: Unity, Power, and Performance Flashpoint’s Chief Product and Engineering Officer, Patrick Gardner, introduces Flashpoint Ignite—our new platform to...
View ArticleBeyond Gates and Alarms: The Scope and Impact of Physical Security Intelligence
Blogs Blog Beyond Gates and Alarms: The Scope and Impact of Physical Security Intelligence Exploring the role of physical security intelligence, which helps governments and commercial enterprises keep...
View ArticleHow to Combat Check Fraud: Leveraging Intelligence to Prevent Financial Loss
Blogs Blog How to Combat Check Fraud: Leveraging Intelligence to Prevent Financial Loss Criminals increasingly steal checks and sell them on illicit online marketplaces, where check fraud-related...
View ArticleLessons From Clop: Combating Ransomware and Cyber Extortion Events
Blogs Blog Lessons From Clop: Combating Ransomware and Cyber Extortion Events Recent attacks from Clop emphasize the importance of implementing an organization-wide ransomware and cyber extortion...
View ArticleDays of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism
Blogs Blog Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism Social media and messaging platforms like Telegram continue to play a key role in understanding events, rumors, and...
View ArticleLost in Transition: A Timeline of Failed Successors to Breach and Raid Forums
Blogs Blog Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums The legacy of Raid, Breach, and their ‘successors’ provides an important lens into how data breach communities...
View ArticleThe Seven Phases of a Ransomware Attack: A Step-by-Step Breakdown of the...
Blogs Blog The Seven Phases of a Ransomware Attack: A Step-by-Step Breakdown of the Attack Lifecycle Understanding the anatomy of a ransomware attack empowers security teams to strengthen defenses,...
View ArticleThe Flashpoint Firehose: 5 Questions With Michael Raypold, VP of Engineering
Blogs Blog The Flashpoint Firehose: 5 Questions With Michael Raypold, VP of Engineering We sit down for a Q&A with Michael Raypold to discuss the launch of the Flashpoint Firehose, our new...
View ArticleUnmasking the Attacker and Decoding Threat Actor Patterns
Blogs Blog Unmasking the Attacker and Decoding Threat Actor Patterns Contextual visibility into the patterns and activities of threat actors streamlines investigations and helps your organization...
View ArticleQakbot Takedown: A Brief Victory in the Fight Against Resilient Malware
Blogs Blog Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware Prior botnet takedowns like Emotet and TrickBot have shown that sophisticated malware operations, like Qakbot, can...
View ArticleG2 Recognizes Flashpoint as High-Performing ‘Leader’ in Enterprise Threat...
Blogs Blog G2 Recognizes Flashpoint as High-Performing ‘Leader’ in Enterprise Threat Intelligence Breaking down Flashpoint’s rankings in G2’s 2023 fall reports, including customer testimonials SHARE...
View ArticleThe First 72 Hours of the Israel-Hamas War: Hamas and PIJ Activity on Telegram
Blogs Blog The First 72 Hours of the Israel-Hamas War: Hamas and PIJ Activity on Telegram Analyzing Telegram’s role in facilitating communication and strategy for Hamas and PIJ during the initial days...
View ArticleBeyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack...
Blogs Blog Beyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack on Israel Examining current and potential involvement of militant terrorist groups in the Israel-Hamas conflict,...
View ArticleFSB-Linked Star Blizzard Campaign Disrupted: What You Need to Know
Blogs Blog FSB-Linked Star Blizzard Campaign Disrupted: What You Need to Know The Russian hacking group Star Blizzard has been disrupted, but the threat remains. SHARE THIS: Flashpoint Intel Team...
View ArticleThe Value and Importance of Identity Intelligence
Blogs Blog The Value and Importance of Identity Intelligence Learn how identity intelligence helps businesses and governments leverage digital identities to combat crime, enhance security operations,...
View ArticleJustice Department Disrupts Russian Intelligence Spear-Phishing Efforts
Blogs Blog Justice Department Disrupts Russian Intelligence Spear-Phishing Efforts Department’s actions were coordinated with concurrent actions by Microsoft. SHARE THIS: Flashpoint October 10, 2024...
View ArticlePureLogs: The Low-Cost Infostealer with a High-Impact Threat
Blogs Blog PureLogs: The Low-Cost Infostealer with a High-Impact Threat In this blog post we talk about PureLogs, what it is, and how organizations can protect themselves against this emerging threat....
View ArticleCredit Card Fraud in 2024: A Complete Guide to Prevention
Blogs Blog Credit Card Fraud in 2024: A Complete Guide to Prevention Just launched, The Complete Guide to Credit Card Fraud and Prevention offers expert intelligence and practical solutions to combat...
View ArticleTwo Sudanese Nationals Indicted for Alleged Role in Anonymous Sudan...
Blogs Blog Two Sudanese Nationals Indicted for Alleged Role in Anonymous Sudan Cyberattacks on Hospitals, Government Facilities, and Other Critical Infrastructure in Los Angeles and Around the World...
View ArticleThe New Cold War is Here: Preparing Your Business for The Convergence of...
Blogs Blog The New Cold War is Here: Preparing Your Business for The Convergence of Geopolitical, Physical and Cyber Threats As geopolitical tensions escalate and cybercriminal tactics evolve,...
View ArticleU.S. Joins International Action Against RedLine and META Infostealers
Blogs Blog U.S. Joins International Action Against RedLine and META Infostealers RedLine and META Infostealers stole information from millions of victims around the world; U.S. complaint charges...
View ArticleEnhancing Cryptocurrency Investigations: Flashpoint Partners with TRM Labs
Blogs Blog Enhancing Cryptocurrency Investigations: Flashpoint Partners with TRM Labs Flashpoint joins forces with TRM Labs, the global leader in blockchain intelligence. Read on to learn what this...
View ArticleRedLine and META Takedown: A Turning Point in the Infostealer Landscape?
Blogs Blog RedLine and META Takedown: A Turning Point in the Infostealer Landscape? Flashpoint has collected over 451 million unique credentials sourced from RedLine and META this year alone. In this...
View Article