Threat Intel Blog

Informative, solution-oriented content for security practitioners — from breaking news, expert analysis, and thought leadership to essential guides, articles, videos, blogs, and more.

What interests you?
  • Brand Protection
  • Corporate and Physical Security
  • Court documents
  • Current events
  • Cyber threat intelligence
  • Data breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit communities
  • Insider threats
  • Israel-Hamas conflict
  • Product features
  • Public Sector and Government
  • Ransomware
  • Vulnerability management
    clear all
    Cyber Threat Intelligence
    Evolving Tactics: How Russian APT Groups Are Shaping Cyber Threats in 2024
    A deep dive into Russian APTs, their targets, and their evolving TTPs, including malware used in spear-phishing ...
    Read post
    Fraud
    Shielding Financial Assets from Cyber Threats Through Fraud Intelligence
    In this blog, well explore the evolving financial threat landscape, the challenges organizations face, and how ...
    Read post
    Court documents
    COURT DOC: U.S. Charges Russian National with Developing and Operating LockBit Ransomware
    The U.S. Justice Department unsealed charges today against a Russian national for his alleged role as the ...
    Read post
    Cyber Threat Intelligence
    Webinar Recap: Data-Driven Insights to Navigate Today’s Security Challenges
    Check out our recap of our latest webinar featuring Ian Gray and Brian Martin, where they offer in-depth analysis ...
    Read post
    Court documents
    COURT DOC: Justice Department Charges Four Iranian Nationals for Multi-Year Cyber Campaign Targeting U.S. Companies
    An indictment was unsealed today in Manhattan federal court charging Iranian nationals Hossein Harooni (حسین ...
    Read post
    Court documents
    COURT DOC: Justice Department Seizes Four Web Domains Used to Create Over 40,000 Spoofed Websites and Store the Personal Information of More Than a Million Victims
    The Justice Department announced the seizure of four domains used by the administrators and customers of a domain ...
    Read post
    Flashpoint
    Automated Source Discovery: How Flashpoint AI Rapidly Scales the Intelligence Collection Process
    Automated Source Discovery (ASD) is more than just a tool; it’s an essential component of an innovative ...
    Read post
    Cyber Threat Intelligence
    Emerging Cyber Extortion Tactics and How to Fight Back
    Explore the evolving landscape of cyber extortion where ransomware merges with threats like data theft and ...
    Read post
    Cyber Threat Intelligence
    Amid Escalating Iran-Israel Conflict, Understanding the Hybrid Nature of Cyber Threats
    Exploring the dynamics of cyber warfare in the current Iran-Israel Conflict: Threat actors, motivations, ...
    Read post
    Cyber Threat Intelligence
    Navigating the Perils of Tax Fraud: A Guide to Protecting Your Data During Tax Season
    The complexity and sophistication of tax schemes have grown, making it crucial for organizations to arm ...
    Read post
    Product
    Advancing Threat Intelligence: Flashpoint’s Continuous AI Evolution
    How Flashpoint is leveraging Artificial Intelligence to transform threat data into actionable intelligence—and ...
    Read post
    Vulnerability Management
    XZ Utils and the Critical Role of Vulnerability Intelligence
    The discovery of the recent XZ Utils vulnerability once again highlights the importance of comprehensive ...
    Read post
    Load more
    There are no results that match your criteria.

    Subscribe to our threat intelligence newsletter

    Interested to see top news from Flashpoint hit your inbox directly? Subscribe to our newsletter to receive curated content on a regular basis.