Posts in Category

Cyber Threat Intelligence

Cyber Threat Intelligence
Navigating 2026’s Converged Threats: Insights from Flashpoint’s Global Threat Intelligence Report
In this post, we preview the critical findings of the 2026 Global Threat Intelligence Report, highlighting how ...
Read post
Cyber Threat Intelligence
The Human Element: Turning Threat Actor OPSEC Fails into Investigative Breakthroughs
In this post, we explore how the psychological traps of operational security can unmask even the most ...
Read post
Corporate & Physical Security
Cyber and Physical Risks Targeting the 2026 Winter Olympics
In this post we analyze the multi-vector threat landscape of the 2026 Winter Olympics, examining how the Games’ ...
Read post
Cyber Threat Intelligence
Flashpoint’s Threat Intelligence Capability Assessment
In this post we introduce a new free assessment designed to pinpoint intelligence gaps, top strategic priorities ...
Read post
Corporate and Physical Security
Protecting the Big Game: A Threat Assessment for Super Bowl LX
This threat assessment analyzes potential physical and cyber threats to Super Bowl LIX.
Read post
Cyber Threat Intelligence
OSINT APIs for Mere Mortals
When it comes to OSINT research, APIs can be mightily helpful. Here are three ways to create custom capabilities ...
Read post
Cyber Threat Intelligence
How China’s “Walled Garden” is Redefining the Cyber Threat Landscape
In our latest webinar, Flashpoint unpacks the architecture of Chinese threat actor cyber ecosytem—a parallel ...
Read post
Cyber Threat Intelligence
The Five Phases of the Threat Intelligence Lifecycle
The threat intelligence lifecycle is a foundational framework for all fraud, physical security, and cybersecurity ...
Read post
Insider Threat
Insider Threats: Turning 2025 Intelligence into a 2026 Defense Strategy
In this post, we break down the 91,321 instances of insider activity observed by Flashpoint in 2025, examine the ...
Read post
Cyber Threat Intelligence
The Top Threat Actor Groups Targeting the Financial Sector
In this post, we identify and analyze the top threat actors that have been actively targeting the financial ...
Read post
Cyber Threat Intelligence
Why Effective CTEM Must be an Intelligence-Led Program
Continuous Threat Exposure Management (CTEM) is a continuous program and operational framework, not a single ...
Read post
Infostealer
The Infostealer Gateway: Uncovering the Latest Methods in Defense Evasion
In this post, we analyze the evolving bypass tactics threat actors are using to neutralize traditional security ...
Read post