Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Court Documents
    COURT DOC: Russian National Indicted in East Texas for Cyber Hacking Enterprise
    Blogs Blog COURT DOC: Russian National Indicted in East Texas for Cyber Hacking Enterprise According to the U.S. ...
    Read post
    Fraud
    Your Data, Their Gain: How Threat Actors Leverage Tax Season to Commit Fraud
    In 2020, the IRS identified over US$2.3 billion in tax fraud schemes, including tax return fraud. And in 2021, we ...
    Read post
    Cyber Threat Intelligence
    Top 7 Cyber Threats to the Financial Services Sector in 2022
    In our latest report, we detail seven primary cyber threats that organizations across the financial services ...
    Read post
    Cyber Threat Intelligence
    Funding and the Russia-Ukraine War: KYC for Crypto Transactions Proving Difficult
    Flashpoint analysts have uncovered 262 cryptocurrency addresses used in advertisements for donations to either ...
    Read post
    Cyber Threat Intelligence
    Understanding Russia’s “Sovereign Internet”: What Happens If Russia Isolates Itself from the Global Internet?
    The Russian government ordered state-owned portals to connect to its state-controlled domain name system servers ...
    Read post
    Cyber Threat Intelligence
    Brute Force and Credential Stuffing Attacks: How Cyber Threat Actors Gain Access to Accounts—Plus Best Practices for Detection and Prevention
    Brute force and credential stuffing attacks are constant threats to organizations across the private and public ...
    Read post
    Cyber Threat Intelligence
    Raid Forums Is Down. Who’s Behind Its Apparent Seizure?
    On February 25, 2022, Raid Forums—a popular illicit online community notorious for its high-profile large-scale ...
    Read post
    Vulnerability Management
    CISA’s BOD 22-01 Update: Revamping Vulnerability Management Capabilities for Federal Agencies
    The Cybersecurity and Infrastructure Security Agency (CISA) has added 95 more vulnerabilities to Binding ...
    Read post
    Court Documents
    COURT DOC: Romanian Extradited to the United States, Charged With Selling Stolen Credit Card Information Obtained via Malware
    According to the U.S. Department of Justice, A Romanian hacker has been charged with selling millions of stolen ...
    Read post
    Cyber Threat Intelligence
    Russian APT and Ransomware Groups: Vulnerabilities and Threat Actors Who Exploit Them
    Far before Russia launched its full-scale invasion of Ukraine, cybersecurity officials from the Ukrainian ...
    Read post
    Current Events
    ISIS Attacks, February 2022: Key Trends, Statistics, and Geographic Analysis
    The following research is based on information gathered by Flashpoint analysts and data collections. For ...
    Read post
    Cyber Threat Intelligence
    What Are Social Media Bots? And How Do They Impact National Security?
    What exactly are social media bots, why do they matter, and how can intelligence analysts separate bots from real ...
    Read post
    There are no results that match your criteria.