Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Current Events
    5 Reasons Taiwan Is a Growing Source of US-China Tension
    At the end of last year, Flashpoint correctly forecasted that Taiwan would prove critical to US-China relations. ...
    Read post
    Current Events
    After Al-Zawahiri: The Future of Al-Qaeda Leadership
    A look at Ayman al-Zawahiri's influence and legacy, plus how the future of al-Qaeda could take shape.
    Read post
    Cyber Threat Intelligence
    WT1SHOP: Authorities Seize Online Marketplace Selling Stolen Login Credentials and Other PII
    The United States Department of Justice released a notice on Tuesday detailing the seizure of an online ...
    Read post
    Cyber Threat Intelligence
    Three Types of Threat Intelligence: Defined and Explained
    Depending on why it’s collected and what information it yields, the umbrella of threat intelligence can be ...
    Read post
    Cyber Threat Intelligence
    Five Must-Have Skills Every Cyber Threat Intel Analyst Should Possess
    Cyber threat intelligence analysts play an indispensable role in helping organizations understand their threat ...
    Read post
    Current Events
    Russian Journalist Zayakin Detained For Donating $16 to Navalny’s Anti-Corruption Foundation
    Russian authorities have arrested Andrey Zayakin, one of the editors of the “Dissernet” investigative ...
    Read post
    Illicit Communities
    AlphaBay Turns 1—Again: Analyzing the Impact of AlphaBay Market
    One year into its reemergence, AlphaBay has become one of the largest illicit marketplaces on the darknet—and ...
    Read post
    Vulnerability Management
    How to Comply With the DoD’s Newer and Stricter Software Requirements
    We break down H.R. 7900, a well-intentioned but perhaps unrealistic bill that requires companies working with the ...
    Read post
    Vulnerability Management
    What Is an SBOM? The Importance of a Software Bill of Materials
    Cyber attacks like Log4Shell have led the Biden administration to work closely with security experts, as well as ...
    Read post
    Flashpoint
    Best Workplace for Millennials: What Our Team Loves About Working for Flashpoint
    Flashpoint was recently named a Best Workplace for Millennials by Great Place to Work, its second Best Workplace ...
    Read post
    Product Features
    Security Automation Crash Course: Which Workflows Should I Automate?
    Outlining the factors that should impact how risk and intelligence teams choose which security workflows to ...
    Read post
    Fraud
    Prevent Card Fraud With High-Risk Merchants Data: Common Point of Purchase Analysis Made Easy 
    Flashpoint takes CPP analysis and risky merchants off your plate, with our new High-risk Merchant data built into ...
    Read post
    There are no results that match your criteria.