Threat Intel Blog

Informative, solution-oriented content for security practitioners — from breaking news, expert analysis, and thought leadership to essential guides, articles, videos, blogs, and more.

What interests you?
  • Corporate and Physical Security
  • Court documents
  • Current events
  • Cyber threat intelligence
  • Data breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit communities
  • Insider threats
  • Product features
  • Public Sector and Government
  • Ransomware
  • Vulnerability management
    clear all
    Cyber Threat Intelligence
    Data Breaches: What They Are, Why They Occur, and How to Prevent Them
    Data breaches are invaluable to understanding a threat actor’s goals and motivations. Often fueled by financial ...
    Read post
    Cyber Threat Intelligence
    How Flashpoint Shaped the News: A Year of Blogs and Press
    This year, Flashpoint intelligence analysts worked with reporters at a wide variety of publications serving a ...
    Read post
    Cyber Threat Intelligence
    Flashpoint Year In Review: 2022 Intelligence Retro
    Flashpoints annual Year In Review highlights the freshest and most compelling intelligence insights from the ...
    Read post
    Corporate & Physical Security
    Turning OSINT Into Action: How Monitor Helps Intel Analysts Tackle Data Overwhelm
    Monitor—a new alerting and analysis capability from Flashpoint—helps intel analysts quickly and easily ...
    Read post
    Cyber Threat Intelligence
    Holiday Shopping Season 2022: The Complete Retail Threat Landscape
    In this article, we cover the holiday shopping season threat landscape—plus the major economic, social, and ...
    Read post
    Vulnerability Management
    The Journey to 300,000 Vulnerabilities: The Good, The Bad, and The Bizarre
    Our VulnDB team reached a tremendous milestone in our pursuit of best-in-class vulnerability intelligence— ...
    Read post
    Vulnerability Management
    Timeline: CISA and the Biden Administration’s Impact on Cybersecurity
    The US president and Cybersecurity and Infrastructure Security Agency, or CISA, has steadily followed through ...
    Read post
    Current events
    Physical Threat Assessment: What to Know About the 2022 Qatar World Cup
    From accusations of human rights abuses and corruption to negative reactions from religious extremists, the 2022 ...
    Read post
    Cyber Threat Intelligence
    What Is Phishing?
    Phishing schemes can give cyber threat actors the access they need to exploit individuals and organizations. We ...
    Read post
    Vulnerability Management
    How VulnDB Is Helping Organizations Prevent Future Ransomware Attacks
    For over 300,000 vulnerabilities, Flashpoint now provides our Ransomware Likelihood score. This capability can ...
    Read post
    Cyber Threat Intelligence
    Why Telegram Is Essential to Open Source Investigations
    Telegram has become an increasingly popular—and often essential—source of information that can be used for ...
    Read post
    Court documents
    COURT DOC: USA v. Daniel Kaye
    Daniel Kaye has been arraigned on charges of access device fraud and money laundering conspiracy. Kaye’s ...
    Read post
    Load more
    There are no results that match your criteria.

    Subscribe to our threat intelligence newsletter

    Interested to see top news from Flashpoint hit your inbox directly? Subscribe to our newsletter to receive curated content on a regular basis.