Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Product Features
    The Future of Threat Intelligence: Meeting the Moment with Purposeful AI
    We explore Flashpoints latest AI capabilities and our vision for the future of AI in cybersecurity and threat ...
    Read post
    Cyber Threat Intelligence
    Navigating 2025’s Midyear Threats: Insights from Flashpoint’s Intelligence Index
    Flashpoints Global Threat Intelligence Index: 2025 Midyear Edition unveils an unprecedented surge in ...
    Read post
    Cyber Threat Intelligence
    The DPRK Remote Worker Threat: Unmasking North Korea’s Digital Deception
    In this post we unpack insights from our latest community call detailing how North Korean threat actors operate, ...
    Read post
    Product Features
    The Power of Flashpoint Managed Attribution: Enabling Secure Investigations and Intelligence Gathering
    Discover how Flashpoint Managed Attribution (MA) evolved from an internal necessity into a mission-critical tool ...
    Read post
    Fraud
    What is E-Skimming? Detecting and Defending Against Digital Fraud
    While attacks targeting ATMs have been around for virtually as long as the ATMs themselves, security awareness ...
    Read post
    Cyber Threat Intelligence
    Part 2: Vulnerability Insights and Prioritization Report 2025 H1 Analysis
    The last part of this series reveals what happened in the vulnerability landscape in the first half of 2025.
    Read post
    Vulnerability Management
    Part 1: Vulnerability Insights and Prioritization Report 2025 H1 Analysis
    Part one of our two-part series explores why public sources like NVD and CVE fall short, the impact that has on ...
    Read post
    Court Documents
    Justice Department Announces Arrest of Prolific Chinese State-Sponsored Contract Hacker
    Xu Zewei and his co-defendant, PRC national Zhang Yu, are charged for their involvement in computer intrusions ...
    Read post
    Featured
    The Rising Threat of macOS Infostealers: What You Need to Know to Defend Against Them
    The macOS infostealer ecosystem is growing in popularity and sophistication. In this post, Flashpoint analysts ...
    Read post
    Cyber Threat Intelligence
    The Insider Threat Intelligence Cycle
    A growing number of organizations across the public and private sectors are recognizing insider threat as a ...
    Read post
    Court Documents
    Serial Hacker “IntelBroker” Charged For Causing $25 Million In Damages To Victims
    Blogs Blog Serial Hacker “IntelBroker” Charged For Causing $25 Million In Damages To Victims Kai West, a ...
    Read post
    Cyber Threat Intelligence
    AI and Threat Intelligence: The Defenders’ Guide
    Understanding how AI Is reshaping threat intelligence for both attackers and defenders
    Read post
    There are no results that match your criteria.