Threat Intel Blog

Informative, solution-oriented content for security practitioners — from breaking news, expert analysis, and thought leadership to essential guides, articles, videos, blogs, and more.

What interests you?
  • Corporate and Physical Security
  • Court documents
  • Current events
  • Cyber threat intelligence
  • Data breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit communities
  • Insider threats
  • Product features
  • Public Sector and Government
  • Ransomware
  • Vulnerability management
    clear all
    Vulnerability Management
    Deciphering the Biden Administration’s and CISA’s Effects on Cybersecurity and National Security
    The US president and Cybersecurity and Infrastructure Security Agency, or CISA, has steadily followed through ...
    Read post
    Court documents
    COURT DOC: USA v. Daniel Kaye
    Daniel Kaye has been arraigned on charges of access device fraud and money laundering conspiracy. Kaye’s ...
    Read post
    Current events
    Xi’s Rules: Key Takeaways From China’s National Party Congress
    During the Chinese Communist Party’s 20th National Party Congress, a crucial political event that occurs only ...
    Read post
    Cyber Threat Intelligence
    Advanced Persistent Threat (APT) Groups: What Are They and Where Are They Found
    An Advanced Persistent Threat (APT) is a malicious actor who possesses extraordinary skill and ...
    Read post
    Court documents
    COURT DOC: USA v. Mark Sokolovsky, aka “Photix”, aka “raccoonstealer”, aka “black21jack77777”
    On Tuesday, federal grand jury indictment charges against Ukrainian national Mark Sokolovsky were unsealed. The ...
    Read post
    Cyber Threat Intelligence
    Pro-Kremlin Hacktivist Groups Seeking Impact By Courting Notoriety
    Newfound relationships between pro-Kremlin hacktivist groups and the Russian government go beyond helping Russia ...
    Read post
    Vulnerability Management
    What You Need to Know About the Apache Commons Text Flaw (CVE-2022-42889)
    Vulnerability researchers and media sources are paying a lot of attention to CVE-2022-42889, a vulnerability ...
    Read post
    Current events
    Timeline of Russia’s Invasion of Ukraine: Cyber and Physical Warfare
    A collection of Flashpoint coverage of the Russia-Ukraine War, from cyber attacks on infrastructure to illicit ...
    Read post
    Cyber Threat Intelligence
    Combining Cybersecurity with Gaming: Cheats, Insider Threats, Ransomware and More
    The video game industry has grown considerably since its introduction in the early 1970s, with analysts believing ...
    Read post
    Current events
    Defense and damage: The Iranian UAVs Strengthening Russia’s Invasion of Ukraine
    Although Iran initially took a public position of neutrality in the Russia-Ukraine war, it is now supplying UAVs ...
    Read post
    Cyber Threat Intelligence
    What Is Doxing? Leveraging Threat Intel to Protect Your Brand and Executives
    A common form of online harassment, doxing can increase the risk of physical threat and identity theft, and ...
    Read post
    Cyber Threat Intelligence
    Analysis of CISA releases Advisory on Top CVEs Exploited Chinese State-Sponsored Groups
    Federal agencies released a joint advisory identifying twenty of the top vulnerabilities that have been actively ...
    Read post
    Load more
    There are no results that match your criteria.

    Subscribe to our threat intelligence newsletter

    Interested to see top news from Flashpoint hit your inbox directly? Subscribe to our newsletter to receive curated content on a regular basis.