Platform
Product Tours
Why Flashpoint?
Tour the Flashpoint platform – at your own pace, on your own time.
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Integrations
Threat Intelligence Platforms (TIP)
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management (SIEM)
Analysis & Investigations
Product Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats & Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Navigating 2025’s Midyear Threats: Flashpoint’s GTII
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Why Flashpoint
Flashpoint vs. The Competition
Customer Stories
Pricing
Get a Demo
Platform
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Integrations
Threat Intelligence Platforms
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management
Analysis and Investigations
Product Integrations
Product Tours
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats & Risks
Financial Fraud
Ransomware and Data Extortion
Account Takeover
Brand Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Why Flashpoint?
Flashpoint vs. The Competition
Customer Stories
Resource Library
Threat Intelligence Blog
Events & Webinars
Resource Library
Cybersecurity & Intelligence 101
Partner With Flashpoint
Pricing
Get a Demo
Platform
Product Tours
Why Flashpoint?
Tour the Flashpoint platform – at your own pace, on your own time.
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Integrations
Threat Intelligence Platforms (TIP)
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management (SIEM)
Analysis & Investigations
Product Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats & Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Navigating 2025’s Midyear Threats: Flashpoint’s GTII
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Why Flashpoint
Flashpoint vs. The Competition
Customer Stories
Pricing
Get a Demo
Posts in Category
Vulnerability Management
Vulnerability Management
Shai-Hulud: The Self-Replicating Worm Targeting NPM Supply Chains
The Flashpoint Intelligence team breaks down the new Shai-Hulud worm, its impact on the open-source supply chain, ...
Read post
Vulnerability Management
Flashpoint Weekly Vulnerability Insights and Prioritization Report
Anticipate, contextualize, and prioritize vulnerabilities to effectively address threats to your organization.
Read post
Vulnerability Management
Part 1: Vulnerability Insights and Prioritization Report 2025 H1 Analysis
Part one of our two-part series explores why public sources like NVD and CVE fall short, the impact that has on ...
Read post
Vulnerability Management
5,100 Flashpoint Known Exploited Vulnerabilities (KEV): Another Major Milestone for VulnDB
Flashpoint’s VulnDB, the world’s most comprehensive vulnerability intelligence database, hit another major ...
Read post
Vulnerability Management
What to Expect from the EUVD: Addressing Key Questions and Its Place in the Vulnerability Intelligence Ecosystem
In this post we answer the most common questions about the recently released European Vulnerability Database ...
Read post
Vulnerability Management
What Sets Flashpoint’s VulnDB Apart? Inside Flashpoint’s 400,000 Vulnerability Milestone and Latest Intelligence Innovations
Flashpoint’s VulnDB has aggregated over 400,000 vulnerability disclosures, making it the world’s most ...
Read post
Data Breaches
Key Trends in Vulnerability Exploitation and Ransomware: Insights from the 2025 Verizon DBIR
Flashpoint, an official contributor to the 2025 Verizon Data Breach Investigations Report (DBIR), breaks down the ...
Read post
Vulnerability Management
Volatility in CVE: Is the Vulnerability Intelligence Ecosystem Entering a New Chapter?
Doubts surrounding CVE’s longevity are creating substantial volatility in the cybersecurity landscape. Join ...
Read post
Cyber Threat Intelligence
Flashpoint 2025 Global Threat Intelligence Report: Stay Ahead of Emerging Threats
Unlock critical insights and exclusive data to anticipate and respond to the most pressing security threats in ...
Read post
Vulnerability Management
Enhance Vulnerability Management with Flashpoint’s ATT&CK Mapping
Using Flashpoint, organizations can now map vulnerabilities using the MITRE ATT&CK© framework. Read on to learn ...
Read post
Vulnerability Management
Achieve Efficient Prioritization with Flashpoint’s Enriched Vulnerability Intelligence
In this blog, we show the benefits of leveraging comprehensive vulnerability metadata to identify, prioritize, ...
Read post
Vulnerability Management
Your Guide to Proactive Vulnerability Management
Just released eBook details how organizations can leverage vulnerability and threat intelligence to reduce their ...
Read post