Written By:
Flashpoint

Corporate & Physical Security
The Complete Guide to OSINT for Executive Protection
Empower security teams to proactively mitigate evolving threats against high-profile individuals
Read post
Court Documents
Phobos Ransomware Affiliates Arrested in Coordinated International Disruption
The Justice Department has unsealed criminal charges against Roman Berezhnoy, 33, and Egor Nikolaevich Glebov, ...
Read post
Court Documents
Cracked and Nulled Marketplaces Disrupted in International Cyber Operation
The marketplaces has been selling stolen login credentials, hacking tools, and servers for hosting malware and ...
Read post
Court Documents
Justice Department and FBI Conduct International Operation to Delete Malware Used by China-Backed Hackers
According to court documents, the PRC government paid the Mustang Panda group to, among other computer intrusion ...
Read post
Product Features
Flashpoint Intelligence: Delivering Actionable Data for a Safer World
Flashpoint delivers cutting-edge technology, actionable data, and unparalleled expertise, empowering security ...
Read post
Flashpoint
Flashpoint Welcomes Industry Veteran David Lemon as President
Lemon to further accelerate Flashpoint’s growth through extensive experience in executive Go-To-Market roles
Read post
Court Documents
United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group
In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. ...
Read post
Corporate & Physical Security
Executive Protection in a Volatile Threat Landscape: 4 Key Takeaways from Flashpoint’s Intel-Led Community Call
The rise in threats against executives demands a proactive and intelligence-driven approach to threat monitoring ...
Read post
Ransomware
Staying Ahead of Threat Actors: Flashpoint’s 2025 Ransomware Survival Guide
Our new ebook provides actionable strategies to help organizations survive and thrive in the face of evolving ...
Read post
Vulnerability Management
Enhance Vulnerability Management with Flashpoint’s ATT&CK Mapping
Using Flashpoint, organizations can now map vulnerabilities using the MITRE ATT&CK© framework. Read on to learn ...
Read post
Court Documents
Fourteen North Korean Nationals Indicted for Carrying Out Multi-Year Fraudulent Information Technology Worker Scheme and Related Extortions
The conspirators, who worked for DPRK-controlled companies Yanbian Silverstar and Volasys Silverstar, located in ...
Read post
Cyber Threat Intelligence
5 Key Takeaways from ‘The New Cold War’s Hybrid Threats’ Webinar
Geopolitical, cyber, and physical threats are converging in unprecedented ways, reshaping how organizations must ...
Read post