Written By:
Flashpoint Team

The Flashpoint Team represents a collection of experts across teams at Flashpoint, including key executives, cyber and physical security intel analysts, product developers, and marketers.

Cyber Threat Intelligence
After Hydra: Telegram, Cash-out Services, Decentralization, and a Slew of Struggling Alternatives
The fight between various marketplaces for their place under the sun demonstrates the significance of Hydra in ...
Read post
Cyber Threat Intelligence
Even Without a Major Escalation, Cyber Risk Remains a Primary Concern in the Russia-Ukraine War. Here’s Why.
Flashpoint intel analysts examine decisions made by Western governments and commercial entities, such as economic ...
Read post
Cyber Threat Intelligence
Flashpoint Ransomware Dashboard: Helping CTI and SOC Teams Better Defend Against Ransomware Attacks
A quick scan of the news headlines tells us that ransomware events have become a frequent occurrence. It goes ...
Read post
Cyber Threat Intelligence
What Is Threat Intelligence? Understanding the Foundations of an Effective Threat Intel Program
Threat intelligence, which may also refer to the threat intelligence industry, is also an essential ...
Read post
Cyber Threat Intelligence
All Eyes on Red Square: Why Victory Day on May 9 Could Be a Tipping Point In Russia’s War Against Ukraine
Russia’s Victory Day, which occurs every year on May 9, was initially intended to commemorate Soviet losses ...
Read post
Cyber Threat Intelligence
CISA Adds Five ‘New’ Exploits to KEV Catalog, Including 2014’s Heartbleed Vulnerability
On May 4, 2022, CISA added five new entries to the Known Exploited Vulnerabilities Catalog, including the ...
Read post
Cyber Threat Intelligence
Why Commercial Intelligence Is Vital to National Security and Integrated Deterrence
In order to effectively execute a strategy of integrated deterrence, the US government should leverage their ...
Read post
Cyber Threat Intelligence
From TV to IRL: What ‘The Tinder Swindler’, ‘The Dropout’, and ‘Inventing Anna’ Can Teach Us About Real-Life Fraud
These bingeable programs depict a unique type of fraud—each of them masterminded and executed by a threat actor ...
Read post
Vulnerability management
CISA’s Joint Cybersecurity Advisory: Protecting Your Organization From Vulnerabilities – and 29,000 Other Known Exploits
Some of the world’s leading cybersecurity authorities banded together to co-author the Joint Cybersecurity ...
Read post
Cyber Threat Intelligence
Definitive Guide to Ransomware: What It Is and How Your Organization Can Prevent, Detect, and Respond to a Ransomware Attack
A guide to defining, explaining, and understanding ransomware to bolster your organizations security posture ...
Read post
Current events
Russia’s War in Ukraine Has Complicated the Means Through Which Cybercriminals Launder Funds. Here’s How They’re Adapting
Recent sanctions coupled with Russias measures to better control the flow of information and activity on the ...
Read post
Current events
How Russia Is Isolating Its Own Cybercriminals
Sanctions imposed by the Biden administration, coupled with Russias proposed initiative to cut itself off from ...
Read post