Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Vulnerability Management
    The Journey to 300,000 Vulnerabilities: The Good, The Bad, and The Bizarre
    Our VulnDB team reached a tremendous milestone in our pursuit of best-in-class vulnerability intelligence— ...
    Read post
    Vulnerability Management
    Timeline: CISA and the Biden Administration’s Impact on Cybersecurity
    The US president and Cybersecurity and Infrastructure Security Agency, or CISA, has steadily followed through ...
    Read post
    Current Events
    Physical Threat Assessment: What to Know About the 2022 Qatar World Cup
    From accusations of human rights abuses and corruption to negative reactions from religious extremists, the 2022 ...
    Read post
    Cyber Threat Intelligence
    What Is Phishing?
    Phishing schemes can give cyber threat actors the access they need to exploit individuals and organizations. We ...
    Read post
    Vulnerability Management
    Preventing Future Ransomware Attacks With VulnDB
    For over 300,000 vulnerabilities, Flashpoint now provides our Ransomware Likelihood score. This capability can ...
    Read post
    Court Documents
    COURT DOC: Man Charged for Participation in LockBit Global Ransomware Campaign
    According to the U.S. Department of Justice, A criminal complaint filed in the District of New Jersey was ...
    Read post
    Cyber Threat Intelligence
    Why Telegram Is Essential to Open Source Investigations
    Telegram has become an increasingly popular—and often essential—source of information that can be used for ...
    Read post
    Court Documents
    COURT DOC: Hacker and Dark Market Operator Arraigned On Federal Charges
    Daniel Kaye has been arraigned on charges of access device fraud and money laundering conspiracy. Kaye’s ...
    Read post
    Current Events
    Xi’s Rules: Key Takeaways From China’s National Party Congress
    During the Chinese Communist Party’s 20th National Party Congress, a crucial political event that occurs only ...
    Read post
    Cyber Threat Intelligence
    Advanced Persistent Threat (APT) Groups: What Are They and Where Are They Found
    An Advanced Persistent Threat (APT) is a malicious actor who possesses extraordinary skill and ...
    Read post
    Court Documents
    COURT DOC: Newly Unsealed Indictment Charges Ukrainian National with International Cybercrime Operation
    On Tuesday, federal grand jury indictment charges against Ukrainian national Mark Sokolovsky were unsealed. The ...
    Read post
    Cyber Threat Intelligence
    Pro-Kremlin Hacktivist Groups Seeking Impact By Courting Notoriety
    Newfound relationships between pro-Kremlin hacktivist groups and the Russian government go beyond helping Russia ...
    Read post
    There are no results that match your criteria.