Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Court Documents
    COURT DOC: SSNDOB Marketplace Administrator Pleads Guilty To Charges Related To His Operation Of A Series Of Websites That Sold Millions Of Social Security Numbers
    Vitalii Chychasov has pleaded guilty to charges related to his administration of SSNDOB Marketplace, a series of ...
    Read post
    Cyber Threat Intelligence
    Protecting Critical Infrastructure: The Intersection of Industrial Control Systems and Threat Intelligence
    Organizations operating with industrial control systems (ICS) are uniquely positioned within the threat ...
    Read post
    Cyber Threat Intelligence
    LockBit Ransomware: Inside the World’s Most Active Ransomware Group
    In the world of ransomware, LockBit has emerged as a prominent and widespread cyber threat, posing serious ...
    Read post
    Cyber Threat Intelligence
    The New Release of Danabot Version 3: What You Need to Know
    Flashpoint analysts are tracking the newly released “DBot v.3,” the third version of the well-known malware ...
    Read post
    Cyber Threat Intelligence
    Cyber Threat Intelligence Index: June 2023
    Flashpoint’s monthly look at the cyber risk ecosystem affecting organizations around the world, including ...
    Read post
    Court Documents
    COURT DOC: Tracy Resident Charged With Computer Attack On Discovery Bay Water Treatment Facility
    A federal grand jury has indicted Rambler Gallo, charging him with intentionally causing damage to a protected ...
    Read post
    Cyber Threat Intelligence
    The Seven Phases of a Ransomware Attack: A Step-by-Step Breakdown of the Attack Lifecycle
    Understanding the anatomy of a ransomware attack empowers security teams to strengthen defenses, reduce the risk ...
    Read post
    Illicit Communities
    Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums
    The legacy of Raid, Breach, and their successors provides an important lens into how data breach communities ...
    Read post
    Current Events
    Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism
    Social media and messaging platforms like Telegram continue to play a key role in understanding events, rumors, ...
    Read post
    Cyber Threat Intelligence
    Lessons From Clop: Combating Ransomware and Cyber Extortion Events
    Recent attacks from Clop emphasize the importance of implementing an organization-wide ransomware and cyber ...
    Read post
    Vulnerability Management
    Security Fixes Released for Node.js
    New releases of the popular Node.js JavaScript framework are available to address multiple vulnerabilities.
    Read post
    Current Events
    Unmasking Anonymous Sudan: Timeline of DDoS Attacks, Affiliations, and Motivations
    A running timeline of Anonymous Sudan’s DDoS attacks on countries, industries, companies, and governmental ...
    Read post
    There are no results that match your criteria.