Written By:
Flashpoint

Court Documents
Justice Department and FBI Conduct International Operation to Delete Malware Used by China-Backed Hackers
According to court documents, the PRC government paid the Mustang Panda group to, among other computer intrusion ...
Read post
Product Features
Flashpoint Intelligence: Delivering Actionable Data for a Safer World
Flashpoint delivers cutting-edge technology, actionable data, and unparalleled expertise, empowering security ...
Read post
Flashpoint
Flashpoint Welcomes Industry Veteran David Lemon as President
Lemon to further accelerate Flashpoint’s growth through extensive experience in executive Go-To-Market roles
Read post
Court Documents
United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group
In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. ...
Read post
Corporate & Physical Security
Executive Protection in a Volatile Threat Landscape: 4 Key Takeaways from Flashpoint’s Intel-Led Community Call
The rise in threats against executives demands a proactive and intelligence-driven approach to threat monitoring ...
Read post
Ransomware
Staying Ahead of Threat Actors: Flashpoint’s 2025 Ransomware Survival Guide
Our new ebook provides actionable strategies to help organizations survive and thrive in the face of evolving ...
Read post
Vulnerability Management
Enhance Vulnerability Management with Flashpoint’s ATT&CK Mapping
Using Flashpoint, organizations can now map vulnerabilities using the MITRE ATT&CK© framework. Read on to learn ...
Read post
Court Documents
Fourteen North Korean Nationals Indicted for Carrying Out Multi-Year Fraudulent Information Technology Worker Scheme and Related Extortions
The conspirators, who worked for DPRK-controlled companies Yanbian Silverstar and Volasys Silverstar, located in ...
Read post
Cyber Threat Intelligence
5 Key Takeaways from ‘The New Cold War’s Hybrid Threats’ Webinar
Geopolitical, cyber, and physical threats are converging in unprecedented ways, reshaping how organizations must ...
Read post
Court Documents
China-Based Hacker Charged for Conspiring to Develop and Deploy Malware That Exploited Tens of Thousands of Firewalls Worldwide
The malware that exploited the vulnerability discovered by Guan was designed to steal information from infected ...
Read post
Cyber Threat Intelligence
2024 Holiday Season Cyber Threats: Gift Card Fraud & Phishing Schemes on the Rise
In this post, we explain the two biggest online threats facing retailers this year’s holiday season.
Read post
Cyber Threat Intelligence
Flashpoint Intelligence Forecast: The 2025 Threat Landscape
The threat landscape is evolving faster than ever, with cyber, physical, and geopolitical challenges converging ...
Read post