Posts in Category

Cyber Threat Intelligence

Infostealer
The Proactive Defender’s Guide to Infostealers
Our essential new guide for IT, Fraud, and HUNT teams details how to transform raw infostealer data from the ...
Read post
Cyber Threat Intelligence
Critical Vulnerability Exposure: Why the Stolen F5 Data Poses an Imminent Threat
In this post we detail the nation-state F5 cyberattack, analyzing the risk posed by stolen BIG-IP source code and ...
Read post
Flashpoint
FUSE 2025: How Security Leaders Are Operationalizing Flashpoint Intelligence to Thwart Rising Threats
In this post, we summarize the critical themes that emerged at FUSE 2025, detailing how security professionals ...
Read post
Cyber Threat Intelligence
Fact vs. Fiction: Cutting Through the Noise on AI-Powered Cyber Threats
In this post, Flashpoint analysts reveal what their teams are actively observing in threat actor communities, ...
Read post
Cyber Threat Intelligence
Gain the Threat Intelligence Advantage with Primary Source Collection
Close the gaps static feeds leave behind with real-time visibility into closed, fringe, and fast-moving spaces ...
Read post
Infostealer
Infostealers to Watch in 2025: Katz, Bee, Acreed, and More
In this post, we take a closer look at the new infostealer threats of 2025, detailing their unique features and ...
Read post
Cyber Threat Intelligence
Flashpoint and Finch AI: Leveraging OSINT and Analytics for Proactive Cyber Threat Intelligence
Leveraging Flashpoint’s world-class open-source intelligence and Finch AI’s advanced analytics, our ...
Read post
Cyber Threat Intelligence
A New Threat Frontier: Leveraging Discord for OSINT
In this post we unpack insights from our latest webinar detailing the rising significance of Discord for ...
Read post
Cyber Threat Intelligence
Scattered Spider: A Threat Profile
In this post, we break down Scattered Spider’s history, their recent campaigns, and their evolving tactics, ...
Read post
Product Features
The Future of Threat Intelligence: Meeting the Moment with Purposeful AI
We explore Flashpoints latest AI capabilities and our vision for the future of AI in cybersecurity and threat ...
Read post
Cyber Threat Intelligence
The DPRK Remote Worker Threat: Unmasking North Korea’s Digital Deception
In this post we unpack insights from our latest community call detailing how North Korean threat actors operate, ...
Read post
Product Features
The Power of Flashpoint Managed Attribution: Enabling Secure Investigations and Intelligence Gathering
Discover how Flashpoint Managed Attribution (MA) evolved from an internal necessity into a mission-critical tool ...
Read post