Quantcast
Channel: Threat Intelligence Blog | Flashpoint
Browsing latest articles
Browse All 81 View Live

Image may be NSFW.
Clik here to view.

What Is Open Source Intelligence: The Importance of OSINT in Your...

Blogs What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape In order to gain the upper hand, security strategies must include a diverse means of gathering...

View Article


Image may be NSFW.
Clik here to view.

Why We Acquired Echosec Systems: The OSINT Revolution

Blogs Blog Why We Acquired Echosec Systems: The OSINT Revolution Flashpoint CEO Josh Lefkowitz on the Echosec acquisition and the proven, foundational importance of open source intelligence SHARE...

View Article

Image may be NSFW.
Clik here to view.

5 Reasons Taiwan Is a Growing Source of US-China Tension

Blogs Blog 5 Reasons Taiwan Is a Growing Source of US-China Tension Five key indicators that may represent current and future escalations in US-China tensions related to Taiwan.  SHARE THIS:...

View Article

Image may be NSFW.
Clik here to view.

Flashpoint in 2023: A Note From Our CEO

Blogs Blog Flashpoint in 2023: A Note From Our CEO How Flashpoint will improve, innovate, and inspire in 2023 SHARE THIS: Josh Lefkowitz January 12, 2023 Table Of ContentsTable of ContentsHarnessing...

View Article

Image may be NSFW.
Clik here to view.

Card Shop Threat Landscape: BidenCash Dumps 2.1M Stolen Credit Cards

Blogs Blog Card Shop Threat Landscape: BidenCash Dumps 2.1M Stolen Credit Cards What we know about the most recent BidenCash dump, and what it means in the context of the greater card shop threat...

View Article


Image may be NSFW.
Clik here to view.

Risk Intelligence Index: Cyber Threat Landscape by the Numbers

Blogs Blog Risk Intelligence Index: Cyber Threat Landscape by the Numbers Flashpoint’s monthly look at the cyber risk ecosystem affecting organizations around the world, including intelligence, news,...

View Article

Image may be NSFW.
Clik here to view.

The Risk-Reducing Power of Flashpoint Video Search

Blogs Blog The Risk-Reducing Power of Flashpoint Video Search An essential investigative component, Flashpoint’s industry-first video search technology surfaces logos, text, explicit content, and...

View Article

Image may be NSFW.
Clik here to view.

Why We Built Flashpoint Ignite: Unity, Power, and Performance

Blogs Blog Why We Built Flashpoint Ignite: Unity, Power, and Performance Flashpoint’s Chief Product and Engineering Officer, Patrick Gardner, introduces Flashpoint Ignite—our new platform to...

View Article


Image may be NSFW.
Clik here to view.

Beyond Gates and Alarms: The Scope and Impact of Physical Security Intelligence

Blogs Blog Beyond Gates and Alarms: The Scope and Impact of Physical Security Intelligence Exploring the role of physical security intelligence, which helps governments and commercial enterprises keep...

View Article


Image may be NSFW.
Clik here to view.

How to Combat Check Fraud: Leveraging Intelligence to Prevent Financial Loss

Blogs Blog How to Combat Check Fraud: Leveraging Intelligence to Prevent Financial Loss Criminals increasingly steal checks and sell them on illicit online marketplaces, where check fraud-related...

View Article

Image may be NSFW.
Clik here to view.

Lessons From Clop: Combating Ransomware and Cyber Extortion Events

Blogs Blog Lessons From Clop: Combating Ransomware and Cyber Extortion Events Recent attacks from Clop emphasize the importance of implementing an organization-wide ransomware and cyber extortion...

View Article

Image may be NSFW.
Clik here to view.

Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism

Blogs Blog Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism Social media and messaging platforms like Telegram continue to play a key role in understanding events, rumors, and...

View Article

Image may be NSFW.
Clik here to view.

Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums

Blogs Blog Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums The legacy of Raid, Breach, and their ‘successors’ provides an important lens into how data breach communities...

View Article


Image may be NSFW.
Clik here to view.

The Seven Phases of a Ransomware Attack: A Step-by-Step Breakdown of the...

Blogs Blog The Seven Phases of a Ransomware Attack: A Step-by-Step Breakdown of the Attack Lifecycle Understanding the anatomy of a ransomware attack empowers security teams to strengthen defenses,...

View Article

Image may be NSFW.
Clik here to view.

The Flashpoint Firehose: 5 Questions With Michael Raypold, VP of Engineering

Blogs Blog The Flashpoint Firehose: 5 Questions With Michael Raypold, VP of Engineering We sit down for a Q&A with Michael Raypold to discuss the launch of the Flashpoint Firehose, our new...

View Article


Image may be NSFW.
Clik here to view.

Unmasking the Attacker and Decoding Threat Actor Patterns

Blogs Blog Unmasking the Attacker and Decoding Threat Actor Patterns Contextual visibility into the patterns and activities of threat actors streamlines investigations and helps your organization...

View Article

Image may be NSFW.
Clik here to view.

Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware

Blogs Blog Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware Prior botnet takedowns like Emotet and TrickBot have shown that sophisticated malware operations, like Qakbot, can...

View Article


Image may be NSFW.
Clik here to view.

G2 Recognizes Flashpoint as High-Performing ‘Leader’ in Enterprise Threat...

Blogs Blog G2 Recognizes Flashpoint as High-Performing ‘Leader’ in Enterprise Threat Intelligence Breaking down Flashpoint’s rankings in G2’s 2023 fall reports, including customer testimonials SHARE...

View Article

Image may be NSFW.
Clik here to view.

The First 72 Hours of the Israel-Hamas War: Hamas and PIJ Activity on Telegram

Blogs Blog The First 72 Hours of the Israel-Hamas War: Hamas and PIJ Activity on Telegram Analyzing Telegram’s role in facilitating communication and strategy for Hamas and PIJ during the initial days...

View Article

Image may be NSFW.
Clik here to view.

Beyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack...

Blogs Blog Beyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack on Israel Examining current and potential involvement of militant terrorist groups in the Israel-Hamas conflict,...

View Article

Image may be NSFW.
Clik here to view.

FSB-Linked Star Blizzard Campaign Disrupted: What You Need to Know

Blogs Blog FSB-Linked Star Blizzard Campaign Disrupted: What You Need to Know The Russian hacking group Star Blizzard has been disrupted, but the threat remains. SHARE THIS: Flashpoint Intel Team...

View Article


Image may be NSFW.
Clik here to view.

The Value and Importance of Identity Intelligence

Blogs Blog The Value and Importance of Identity Intelligence Learn how identity intelligence helps businesses and governments leverage digital identities to combat crime, enhance security operations,...

View Article


Image may be NSFW.
Clik here to view.

Justice Department Disrupts Russian Intelligence Spear-Phishing Efforts

Blogs Blog Justice Department Disrupts Russian Intelligence Spear-Phishing Efforts Department’s actions were coordinated with concurrent actions by Microsoft. SHARE THIS: Flashpoint October 10, 2024...

View Article

Image may be NSFW.
Clik here to view.

PureLogs: The Low-Cost Infostealer with a High-Impact Threat

Blogs Blog PureLogs: The Low-Cost Infostealer with a High-Impact Threat In this blog post we talk about PureLogs, what it is, and how organizations can protect themselves against this emerging threat....

View Article

Image may be NSFW.
Clik here to view.

Credit Card Fraud in 2024: A Complete Guide to Prevention

Blogs Blog Credit Card Fraud in 2024: A Complete Guide to Prevention Just launched, The Complete Guide to Credit Card Fraud and Prevention offers expert intelligence and practical solutions to combat...

View Article


Image may be NSFW.
Clik here to view.

Two Sudanese Nationals Indicted for Alleged Role in Anonymous Sudan...

Blogs Blog Two Sudanese Nationals Indicted for Alleged Role in Anonymous Sudan Cyberattacks on Hospitals, Government Facilities, and Other Critical Infrastructure in Los Angeles and Around the World...

View Article

Image may be NSFW.
Clik here to view.

The New Cold War is Here: Preparing Your Business for The Convergence of...

Blogs Blog The New Cold War is Here: Preparing Your Business for The Convergence of Geopolitical, Physical and Cyber Threats As geopolitical tensions escalate and cybercriminal tactics evolve,...

View Article

Image may be NSFW.
Clik here to view.

U.S. Joins International Action Against RedLine and META Infostealers

Blogs Blog U.S. Joins International Action Against RedLine and META Infostealers RedLine and META Infostealers stole information from millions of victims around the world; U.S. complaint charges...

View Article

Image may be NSFW.
Clik here to view.

Enhancing Cryptocurrency Investigations: Flashpoint Partners with TRM Labs

Blogs Blog Enhancing Cryptocurrency Investigations: Flashpoint Partners with TRM Labs Flashpoint joins forces with TRM Labs, the global leader in blockchain intelligence. Read on to learn what this...

View Article



Image may be NSFW.
Clik here to view.

RedLine and META Takedown: A Turning Point in the Infostealer Landscape?

Blogs Blog RedLine and META Takedown: A Turning Point in the Infostealer Landscape? Flashpoint has collected over 451 million unique credentials sourced from RedLine and META this year alone. In this...

View Article
Browsing latest articles
Browse All 81 View Live