Written By:
Flashpoint Intel Team

Flashpoint's Intel Team comprises experts with deep intel and security experience across military, federal, government agencies and Fortune 500s, as well as backgrounds in malware analysis, compliance, economic policy, risk, and counterterrorism, among other specialized areas.

Infostealer
The Infostealer Gateway: Uncovering the Latest Methods in Defense Evasion
In this post, we analyze the evolving bypass tactics threat actors are using to neutralize traditional security ...
Read post
Vulnerability Management
Flashpoint Weekly Vulnerability Insights and Prioritization Report
Anticipate, contextualize, and prioritize vulnerabilities to effectively address threats to your organization.
Read post
Infostealer
Beyond the Malware: Inside the Digital Empire of a North Korean Threat Actor
In this post Flashpoint reveals how an infostealer infection on a North Korean threat actor’s machine exposed ...
Read post
Vulnerability Management
Digital Supply Chain Risk: Critical Vulnerability Affecting React Allows for Unauthorized Remote Code Execution
CVE-2025-55182 (VulnDB ID: 428930), is a severe, unauthenticated RCE impacting a major component of React and its ...
Read post
Cyber Threat Intelligence
Flashpoint’s 2025 Holiday Threat Assessment
Flashpoints intelligence assessment for retailers and security teams outlines the top cyber and fraud risks, ...
Read post
Cyber Threat Intelligence
Sharpen Your OSINT Queries: How to Use AI to Eliminate Intelligence Gaps
Flashpoint Intelligence shows analysts how to leverage Generative AI for OSINT keyword expansion, slang ...
Read post
Ransomware
LockBit 5.0 Analysis: Technical Deep Dive into the RaaS Giant’s Latest Upgrade
LockBit 5.0, introduced in late September 2025, is the latest evolution of the dominant Ransomware-as-a-Service ...
Read post
Vulnerability Management
SBOM 102: How to Operationalize SBOM Data Into Real-Time Vulnerability Management
Learn how to operationalize your SBOM data. Integrate automated SBOMs with comprehensive VI to establish trusted ...
Read post
Cyber Threat Intelligence
The Evolution of Data Extortion TTPs: From Exploiting Code to Exploiting People
In this post we break down four eras of data extortion TTPs, tracing the strategic pivot from technical code ...
Read post
Cyber Threat Intelligence
Critical Vulnerability Exposure: Why the Stolen F5 Data Poses an Imminent Threat
In this post we detail the nation-state F5 cyberattack, analyzing the risk posed by stolen BIG-IP source code and ...
Read post
Cyber Threat Intelligence
Fact vs. Fiction: Cutting Through the Noise on AI-Powered Cyber Threats
In this post, Flashpoint analysts reveal what their teams are actively observing in threat actor communities, ...
Read post
Vulnerability Management
Shai-Hulud: The Self-Replicating Worm Targeting NPM Supply Chains
The Flashpoint Intelligence team breaks down the new Shai-Hulud worm, its impact on the open-source supply chain, ...
Read post