Threat Intel Blog

Informative, solution-oriented content for security practitioners — from breaking news, expert analysis, and thought leadership to essential guides, articles, videos, blogs, and more.

What interests you?
  • Corporate and Physical Security
  • Court documents
  • Current events
  • Cyber threat intelligence
  • Data breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit communities
  • Insider threats
  • Product features
  • Public Sector and Government
  • Ransomware
  • Vulnerability management
    clear all
    Vulnerability Management
    The Journey to 300,000 Vulnerabilities: The Good, The Bad, and The Bizarre
    Our VulnDB team reached a tremendous milestone in our pursuit of best-in-class vulnerability intelligence— ...
    Read post
    Vulnerability Management
    Timeline: CISA and the Biden Administration’s Impact on Cybersecurity
    The US president and Cybersecurity and Infrastructure Security Agency, or CISA, has steadily followed through ...
    Read post
    Cyber Threat Intelligence
    What Is Phishing?
    Phishing schemes can give cyber threat actors the access they need to exploit individuals and organizations. We ...
    Read post
    Vulnerability Management
    How VulnDB Is Helping Organizations Prevent Future Ransomware Attacks
    For over 300,000 vulnerabilities, Flashpoint now provides our Ransomware Likelihood score. This capability can ...
    Read post
    Cyber Threat Intelligence
    Why Telegram Is Essential to Open Source Investigations
    Telegram has become an increasingly popular—and often essential—source of information that can be used for ...
    Read post
    Court documents
    COURT DOC: USA v. Daniel Kaye
    Daniel Kaye has been arraigned on charges of access device fraud and money laundering conspiracy. Kaye’s ...
    Read post
    Current events
    Xi’s Rules: Key Takeaways From China’s National Party Congress
    During the Chinese Communist Party’s 20th National Party Congress, a crucial political event that occurs only ...
    Read post
    Cyber Threat Intelligence
    Advanced Persistent Threat (APT) Groups: What Are They and Where Are They Found
    An Advanced Persistent Threat (APT) is a malicious actor who possesses extraordinary skill and ...
    Read post
    Court documents
    COURT DOC: USA v. Mark Sokolovsky, aka “Photix”, aka “raccoonstealer”, aka “black21jack77777”
    On Tuesday, federal grand jury indictment charges against Ukrainian national Mark Sokolovsky were unsealed. The ...
    Read post
    Cyber Threat Intelligence
    Pro-Kremlin Hacktivist Groups Seeking Impact By Courting Notoriety
    Newfound relationships between pro-Kremlin hacktivist groups and the Russian government go beyond helping Russia ...
    Read post
    Vulnerability Management
    What You Need to Know About the Apache Commons Text Flaw (CVE-2022-42889)
    Vulnerability researchers and media sources are paying a lot of attention to CVE-2022-42889, a vulnerability ...
    Read post
    Current events
    Timeline of Russia’s Invasion of Ukraine: Cyber and Physical Warfare
    A collection of Flashpoint coverage of the Russia-Ukraine War, from cyber attacks on infrastructure to illicit ...
    Read post
    Load more
    There are no results that match your criteria.

    Subscribe to our threat intelligence newsletter

    Interested to see top news from Flashpoint hit your inbox directly? Subscribe to our newsletter to receive curated content on a regular basis.