Written By:
Flashpoint

Flashpoint is the industry leader in threat data and intelligence. We combine human-powered data collection and intelligence with intuitive technology to help the world’s leading organizations protect people, places, and assets.

Our Intel Team comprises experts with deep intel and security experience across military, federal, government agencies and Fortune 500s, as well as backgrounds in malware analysis, compliance, economic policy, risk, and counterterrorism, among other specialized areas.

Cyber Threat Intelligence
Why Effective CTEM Must be an Intelligence-Led Program
Continuous Threat Exposure Management (CTEM) is a continuous program and operational framework, not a single ...
Read post
Cyber Threat Intelligence
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
The Justice Department announced two indictments in the Central District of California charging Ukrainian ...
Read post
Cyber Threat Intelligence
Surfacing Threats Before They Scale: Why Primary Source Collection Changes Intelligence
This blog explores how Primary Source Collection (PSC) enables intelligence teams to surface emerging fraud and ...
Read post
Cyber Threat Intelligence
The CTI Analyst’s Isolated Arsenal: Desktop Tools for High-Risk Intelligence
This blog explores how CTI teams safely analyze high-risk environments, engage threat actors, and process ...
Read post
Infostealer
From Endpoint Compromise to Enterprise Breach: Mapping the Infostealer Attack Chain
In Flashpoint’s latest webinar, we map the global infostealer attack chain step-by-step, from initial infection ...
Read post
Cyber Threat Intelligence
Flashpoint’s Top 5 Predictions for the 2026 Threat Landscape
Flashpoint’s forward-looking threat insights for security and executive teams, provides the strategic foresight ...
Read post
Corporate and Physical Security
Building a Proactive Intelligence-Led Physical Security Program with Flashpoint
Flashpoint Echosec helps security leaders build an intelligence-led physical security program. Leverage ...
Read post
Infostealer
The Proactive Defender’s Guide to Infostealers
Our essential new guide for IT, Fraud, and HUNT teams details how to transform raw infostealer data from the ...
Read post
Vulnerability Management
SBOM 101: Why Transparency is a Cybersecurity Imperative
In this post, we define the Software Bill of Materials (SBOM) and explain why it has become a critical foundation ...
Read post
Flashpoint
FUSE 2025: How Security Leaders Are Operationalizing Flashpoint Intelligence to Thwart Rising Threats
In this post, we summarize the critical themes that emerged at FUSE 2025, detailing how security professionals ...
Read post
Court Documents
United Kingdom National Charged in Connection with Multiple Cyber Attacks, Including on Critical Infrastructure
A complaint filed in the District of New Jersey charges Thalha Jubair, a United Kingdom national, with ...
Read post
Product Updates
How Flashpoint Is Reinventing Cyber Threat Investigations with AI
In this blog, we highlight Flashpoint Investigation Management’s new AI-powered capabilities that allow you to ...
Read post