Written By:
Flashpoint Team

The Flashpoint Team represents a collection of experts across teams at Flashpoint, including key executives, cyber and physical security intel analysts, product developers, and marketers.

Cyber Threat Intelligence
How Flashpoint Shaped the News: A Year of Blogs and Press
This year, Flashpoint intelligence analysts worked with reporters at a wide variety of publications serving a ...
Read post
Cyber Threat Intelligence
Flashpoint Year In Review: 2022 Intelligence Retro
Flashpoints annual Year In Review highlights the freshest and most compelling intelligence insights from the ...
Read post
Corporate & Physical Security
Turning OSINT Into Action: How Monitor Helps Intel Analysts Tackle Data Overwhelm
Monitor—a new alerting and analysis capability from Flashpoint—helps intel analysts quickly and easily ...
Read post
Cyber Threat Intelligence
Holiday Shopping Season 2022: The Complete Retail Threat Landscape
In this article, we cover the holiday shopping season threat landscape—plus the major economic, social, and ...
Read post
Vulnerability Management
Timeline: CISA and the Biden Administration’s Impact on Cybersecurity
The US president and Cybersecurity and Infrastructure Security Agency, or CISA, has steadily followed through ...
Read post
Current events
Physical Threat Assessment: What to Know About the 2022 Qatar World Cup
From accusations of human rights abuses and corruption to negative reactions from religious extremists, the 2022 ...
Read post
Cyber Threat Intelligence
What Is Phishing?
Phishing schemes can give cyber threat actors the access they need to exploit individuals and organizations. We ...
Read post
Vulnerability Management
How VulnDB Is Helping Organizations Prevent Future Ransomware Attacks
For over 300,000 vulnerabilities, Flashpoint now provides our Ransomware Likelihood score. This capability can ...
Read post
Cyber Threat Intelligence
Why Telegram Is Essential to Open Source Investigations
Telegram has become an increasingly popular—and often essential—source of information that can be used for ...
Read post
Court documents
COURT DOC: USA v. Daniel Kaye
Daniel Kaye has been arraigned on charges of access device fraud and money laundering conspiracy. Kaye’s ...
Read post
Current events
Xi’s Rules: Key Takeaways From China’s National Party Congress
During the Chinese Communist Party’s 20th National Party Congress, a crucial political event that occurs only ...
Read post
Cyber Threat Intelligence
Advanced Persistent Threat (APT) Groups: What Are They and Where Are They Found
An Advanced Persistent Threat (APT) is a malicious actor who possesses extraordinary skill and ...
Read post