Posts in Category

Function

Vulnerability Management
Flashpoint Weekly Vulnerability Insights and Prioritization Report
Anticipate, contextualize, and prioritize vulnerabilities to effectively address threats to your organization.
Read post
Corporate and Physical Security
Building a Proactive Intelligence-Led Physical Security Program with Flashpoint
Flashpoint Echosec helps security leaders build an intelligence-led physical security program. Leverage ...
Read post
Vulnerability Management
SBOM 102: How to Operationalize SBOM Data Into Real-Time Vulnerability Management
Learn how to operationalize your SBOM data. Integrate automated SBOMs with comprehensive VI to establish trusted ...
Read post
Cyber Threat Intelligence
The Evolution of Data Extortion TTPs: From Exploiting Code to Exploiting People
In this post we break down four eras of data extortion TTPs, tracing the strategic pivot from technical code ...
Read post
Infostealer
The Proactive Defender’s Guide to Infostealers
Our essential new guide for IT, Fraud, and HUNT teams details how to transform raw infostealer data from the ...
Read post
Cyber Threat Intelligence
Critical Vulnerability Exposure: Why the Stolen F5 Data Poses an Imminent Threat
In this post we detail the nation-state F5 cyberattack, analyzing the risk posed by stolen BIG-IP source code and ...
Read post
Vulnerability Management
SBOM 101: Why Transparency is a Cybersecurity Imperative
In this post, we define the Software Bill of Materials (SBOM) and explain why it has become a critical foundation ...
Read post
Flashpoint
FUSE 2025: How Security Leaders Are Operationalizing Flashpoint Intelligence to Thwart Rising Threats
In this post, we summarize the critical themes that emerged at FUSE 2025, detailing how security professionals ...
Read post
Cyber Threat Intelligence
Fact vs. Fiction: Cutting Through the Noise on AI-Powered Cyber Threats
In this post, Flashpoint analysts reveal what their teams are actively observing in threat actor communities, ...
Read post
Product Updates
How Flashpoint Is Reinventing Cyber Threat Investigations with AI
In this blog, we highlight Flashpoint Investigation Management’s new AI-powered capabilities that allow you to ...
Read post
Vulnerability Management
Shai-Hulud: The Self-Replicating Worm Targeting NPM Supply Chains
The Flashpoint Intelligence team breaks down the new Shai-Hulud worm, its impact on the open-source supply chain, ...
Read post
Cyber Threat Intelligence
5 Critical Shifts Shaping the Cyber Threat Landscape in 2025
From AI-powered threats to ransomware evolution, here’s what’s reshaping the threat landscape and what your ...
Read post