Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Court Documents
    COURT DOC: Cybercriminal Connected to Multimillion Dollar Ransomware Attacks Sentenced for Online Fraud Schemes
    According to the U.S. Department of Justice, An Estonian man was sentenced today to 66 months in prison for his ...
    Read post
    Cyber Threat Intelligence
    Russia’s Efforts to Control the Flow of Information at Home Shows the Limits of Censorship in the Digital Age
    As its war against Ukraine rages on, Russia is attempting to block, throttle, fine, and/or censor nearly all ...
    Read post
    Court Documents
    COURT DOC: Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide
    The Department of Justice unsealed two indictments today charging four defendants, all Russian nationals who ...
    Read post
    Cyber Threat Intelligence
    All About LAPSUS$: What We Know About the Extortionist Group [Updated]
    On March 23, Bloomberg released an article tying the group’s ringleader to the online aliases “white” and ...
    Read post
    Cyber Threat Intelligence
    Shields Up: Understanding Guidance From the Biden Administration About Possible Russian Cyberattacks
    On Monday March 21, the Biden Administration released several statements stressing the importance of ...
    Read post
    Cyber Threat Intelligence
    Equipping Modern Command and Control Centers in the Age of PAI
    What does the rise of open-source data mean for command and control centers? What software capabilities do ...
    Read post
    Court Documents
    COURT DOC: Russian National Indicted in East Texas for Cyber Hacking Enterprise
    Blogs Blog COURT DOC: Russian National Indicted in East Texas for Cyber Hacking Enterprise According to the U.S. ...
    Read post
    Fraud
    Your Data, Their Gain: How Threat Actors Leverage Tax Season to Commit Fraud
    In 2020, the IRS identified over US$2.3 billion in tax fraud schemes, including tax return fraud. And in 2021, we ...
    Read post
    Cyber Threat Intelligence
    Top 7 Cyber Threats to the Financial Services Sector in 2022
    In our latest report, we detail seven primary cyber threats that organizations across the financial services ...
    Read post
    Cyber Threat Intelligence
    Funding and the Russia-Ukraine War: KYC for Crypto Transactions Proving Difficult
    Flashpoint analysts have uncovered 262 cryptocurrency addresses used in advertisements for donations to either ...
    Read post
    Cyber Threat Intelligence
    Understanding Russia’s “Sovereign Internet”: What Happens If Russia Isolates Itself from the Global Internet?
    The Russian government ordered state-owned portals to connect to its state-controlled domain name system servers ...
    Read post
    Cyber Threat Intelligence
    Brute Force and Credential Stuffing Attacks: How Cyber Threat Actors Gain Access to Accounts—Plus Best Practices for Detection and Prevention
    Brute force and credential stuffing attacks are constant threats to organizations across the private and public ...
    Read post
    There are no results that match your criteria.