Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Vulnerability Management
    Hackers Are Still Exploiting Log4Shell Vulnerability, Warns CISA
    Yesterday, CISA and US Coast Guard Cyber Command (CGCYBER) warned that nation-state hackers are still exploiting ...
    Read post
    Vulnerability Management
    Patch Tuesday Isn’t Ending. Here’s What Microsoft is Saying
    According to Microsoft, Patch Tuesday will continue in July 2022 and the foreseeable future. Unfortunately, ...
    Read post
    Current Events
    Biden Signs State and Local Government Cybersecurity Act Into Law; Establishes Rotational Cyber Workforce
    President Biden signed two cyber-related bills into law on June 21, both of which aim to bolster the ...
    Read post
    Cyber Threat Intelligence
    Why Every Business Should Have Threat Intelligence Program
    Threat intelligence is an essential component to any organization’s risk-remediation and security program. ...
    Read post
    Product Features
    Protect Your Customer Base From Fraud and Account Takeover (ATO) With CCM-C
    It’s imperative for organizations to have a plan for proactively preventing customer fraud and account takeover ...
    Read post
    Vulnerability Management
    China is Exploiting Network Providers and Devices, Says US Cybersecurity Advisory
    On June 7, the US Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), ...
    Read post
    Current Events
    SSNDOB Marketplace Admin Pleads Guilty to Fraud, Trafficking PII
    The DOJs takedown of SSNDOB is the latest in a series of seizures of illicit marketplaces, forums, and shops, ...
    Read post
    Cyber Threat Intelligence
    After Hydra: Telegram, Cash-out Services, Decentralization, and a Slew of Struggling Alternatives
    The fight between various marketplaces for their place under the sun demonstrates the significance of Hydra in ...
    Read post
    Vulnerability Management
    The Practitioner’s Guide to Vulnerability Intelligence
    Learn how vulnerability intelligence can help you manage risks and protect your organization from cyber threats.
    Read post
    Flashpoint
    Flashpoint at PyCon 2022: Team Building, Plus 4 Essential Talks
    Last month, a number of Flashpointers attended PyCon 2022 in Salt Lake City to level up our Python programming ...
    Read post
    Corporate & Physical Security
    How Does Information Become Intelligence? 5 Software Capabilities
    Turning information into intelligence seems simple enough, but the process is complicated by data overload, ...
    Read post
    Cyber Threat Intelligence
    DOJ: Good-Faith Security Research ‘Should Not Be Charged’
    Understanding good-faith security research and the DOJs revised policy regarding charging violations of the ...
    Read post
    There are no results that match your criteria.