Platform
Why Flashpoint?
Learn more about Flashpoint’s products and services.
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Management (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Threat Response & Readiness
Professional Services
Managed Intelligence
Tailored Reporting
Curated Alerting
Request for Information (RFI)
Data-as-a-Service
Solutions
By Threats and Risks
Account Takeover
Ransomware
Protective Intelligence
By Industry
Financial Services
Retail
Healthcare & Pharmaceuticals
Technology
Public Sector & National Security
Resources
Case study
How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack
Threat Intel Blog
Events & Webinars
Resource Library
Cybersecurity Glossary
Partners
Company
About Us
Careers
News
Contact Us
Get a Demo
Log in
Why Flashpoint?
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Management (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Ransomware Attack Response and Readiness
Professional Services
Tailored Reporting
Curated Alerting
Managed Intelligence
Request for Information
Solutions
By Threats and Risks
Account Takeover
Ransomware and Data Extortion
Protective Intelligence
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resource Library
Threat Intelligence Blog
Events & Webinars
Resource Library
Cybersecurity & Intelligence 101
Partner With Flashpoint
Company
About Us
Flashpoint Careers
Flashpoint News
Contact Us
Platform
Why Flashpoint?
Learn more about Flashpoint’s products and services.
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Management (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Threat Response & Readiness
Professional Services
Managed Intelligence
Tailored Reporting
Curated Alerting
Request for Information (RFI)
Data-as-a-Service
Solutions
By Threats and Risks
Account Takeover
Ransomware
Protective Intelligence
By Industry
Financial Services
Retail
Healthcare & Pharmaceuticals
Technology
Public Sector & National Security
Resources
Case study
How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack
Threat Intel Blog
Events & Webinars
Resource Library
Cybersecurity Glossary
Partners
Company
About Us
Careers
News
Contact Us
Get a Demo
Log in
Posts in Category
Illicit communities
Cyber Threat Intelligence
Emerging Cyber Extortion Tactics and How to Fight Back
Explore the evolving landscape of cyber extortion where ransomware merges with threats like data theft and ...
Read post
Cyber threat intelligence
ALPHV’s Downfall? The 2023 Crackdown on BlackCat Ransomware
Exploring the impact of ALPHVs ransomware blog takedown by law enforcement and its impact on the greater cyber ...
Read post
Cyber Threat Intelligence
Navigating the AI Threat Landscape: From Executive Orders to Cyber Frontlines
A deep dive into AI's double-edged sword, from regulatory efforts to malicious exploits
Read post
Cyber Threat Intelligence
Cyber Threat Intelligence Index: Q3 2023 Edition
Data, insights, and analysis on the most impactful events and threats that took place between July 1, 2023 to ...
Read post
Cyber Threat Intelligence
The Israel-Hamas War: Insights Through an Intelligence Lens
Flashpoint delves into the Israel-Hamas War (Israel-Gaza War)—reporting on observed and potential cyber threats ...
Read post
Illicit communities
“RisePro” Stealer Returns with New Updates
After a seven month hiatus, RisePro stealer has reappeared for sale on a mid-tier forum, with claims from its ...
Read post
Current events
Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware
Prior botnet takedowns like Emotet and TrickBot have shown that sophisticated malware operations, like Qakbot, ...
Read post
Cyber Threat Intelligence
The Emergence of Ransomed: An Uncertain Cyber Threat in the Making
The legitimacy and impact of Ransomed remains to be seen, but their innovation to coerce victims into paying has ...
Read post
Illicit communities
Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums
The legacy of Raid, Breach, and their successors provides an important lens into how data breach communities ...
Read post
Cyber threat intelligence
Lessons From Clop: Combating Ransomware and Cyber Extortion Events
Recent attacks from Clop emphasize the importance of implementing an organization-wide ransomware and cyber ...
Read post
Cyber Threat Intelligence
Killnet: Inside the World’s Most Prominent Pro-Kremlin Hacktivist Collective
Well-known pro-Kremlin hactivist group Killnet has been noted for its level of activity and ambition, especially ...
Read post
Cyber Threat Intelligence
What is Deepfake Technology and How Are Threat Actors Using It?
Deepfake technology is a form of artificial intelligence that employs machine learning algorithms to generate ...
Read post