Platform
Why Flashpoint?
Learn more about Flashpoint’s products and services.
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Management (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Threat Response & Readiness
Professional Services
Managed Intelligence
Tailored Reporting
Curated Alerting
Request for Information (RFI)
Data-as-a-Service
Solutions
By Threats and Risks
Account Takeover
Ransomware
Protective Intelligence
By Industry
Financial Services
Retail
Healthcare & Pharmaceuticals
Technology
Public Sector & National Security
Resources
Case study
How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack
Threat Intel Blog
Events & Webinars
Resource Library
Cybersecurity Glossary
Partners
Company
About Us
Careers
News
Contact Us
Get a Demo
Log in
Why Flashpoint?
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Management (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Ransomware Attack Response and Readiness
Professional Services
Tailored Reporting
Curated Alerting
Managed Intelligence
Request for Information
Solutions
By Threats and Risks
Account Takeover
Ransomware and Data Extortion
Protective Intelligence
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resource Library
Threat Intelligence Blog
Events & Webinars
Resource Library
Cybersecurity & Intelligence 101
Partner With Flashpoint
Company
About Us
Flashpoint Careers
Flashpoint News
Contact Us
Platform
Why Flashpoint?
Learn more about Flashpoint’s products and services.
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Management (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Threat Response & Readiness
Professional Services
Managed Intelligence
Tailored Reporting
Curated Alerting
Request for Information (RFI)
Data-as-a-Service
Solutions
By Threats and Risks
Account Takeover
Ransomware
Protective Intelligence
By Industry
Financial Services
Retail
Healthcare & Pharmaceuticals
Technology
Public Sector & National Security
Resources
Case study
How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack
Threat Intel Blog
Events & Webinars
Resource Library
Cybersecurity Glossary
Partners
Company
About Us
Careers
News
Contact Us
Get a Demo
Log in
Posts in Category
Topic
Court documents
COURT DOC: Justice Department Seizes Four Web Domains Used to Create Over 40,000 Spoofed Websites and Store the Personal Information of More Than a Million Victims
The Justice Department announced the seizure of four domains used by the administrators and customers of a domain ...
Read post
Flashpoint
Automated Source Discovery: How Flashpoint AI Rapidly Scales the Intelligence Collection Process
Automated Source Discovery (ASD) is more than just a tool; it’s an essential component of an innovative ...
Read post
Cyber Threat Intelligence
Emerging Cyber Extortion Tactics and How to Fight Back
Explore the evolving landscape of cyber extortion where ransomware merges with threats like data theft and ...
Read post
Featured
Amid Escalating Iran-Israel Conflict, Understanding the Hybrid Nature of Cyber Threats
Exploring the dynamics of cyber warfare in the current Iran-Israel Conflict: Threat actors, motivations, ...
Read post
Vulnerability Management
XZ Utils and the Critical Role of Vulnerability Intelligence
The discovery of the recent XZ Utils vulnerability once again highlights the importance of comprehensive ...
Read post
Vulnerability Management
What the NVD ‘Slowdown’ Means For You: How to Stay Ahead in Vulnerability Management
Flashpoint’s vulnerability intelligence is powered by an independent research team that is constantly on the ...
Read post
Cyber Threat Intelligence
A Global Pulse on Threat Intelligence: What You Need to Know As 2024 Unfolds
Explore in-depth coverage ranging from data breaches, vulnerabilities, and ransomware, to tailored ...
Read post
Court documents
COURT DOC: Seven Hackers Associated with Chinese Government Charged with Computer Intrusions Targeting Perceived Critics of China and U.S. Businesses and Politicians
An indictment was unsealed charging nationals of the People’s Republic of China related to their involvement in ...
Read post
Cyber Threat Intelligence
Webinar Recap: Generative AI for OSINT – 4 Next-Level Techniques
Check out our recap of the four open-source intelligence (OSINT) use cases outlined in our recent webinar with ...
Read post
Court documents
COURT DOC: Iranian National Charged for Multi-Year Hacking Campaign Targeting U.S. Defense Contractors and Private Sector Companies
According to court documents, from at least in or about 2016 through in or about April 2021, Alireza Shafie ...
Read post
Vulnerability management
Navigating the Cyber Defense Landscape: The Buyer’s Guide for Vulnerability Intelligence
Vulnerability management demands a concerted effort, replete with substantial resources and nuanced expertise. ...
Read post
Court documents
COURT DOC: U.S. and U.K. Disrupt LockBit Ransomware Variant
The Department of Justice joined the United Kingdom and international law enforcement partners in London today to ...
Read post