Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Court Documents
    COURT DOC: Two Chinese Hackers Working with the Ministry of State Security Charged with Global Computer Intrusion Campaign
    A federal grand jury in Spokane, Washington, returned an indictment earlier this month charging two hackers, both ...
    Read post
    Cyber Threat Intelligence
    Emerging Trends in QR Code Fraud
    QR codes, square-shaped machine readable codes, allow consumers to download apps, initiate customer service, ...
    Read post
    Vulnerability Management
    The Vulnerability Whack-a-Mole Game
    Most professionals have probably heard the classic business iceberg metaphor quite a few times during their ...
    Read post
    Cyber Threat Intelligence
    U.S. Department of Justice Shares Best Practices for Gathering Threat Intelligence
    This week, the U.S. Department of Justice (DoJ) published “Legal Considerations when Gathering Online Cyber ...
    Read post
    Cyber Threat Intelligence
    How To Use Open Source Intelligence for Executive Protection
    For years, companies have been using online data to protect their organizations against cyber compromise. But can ...
    Read post
    Vulnerability Management
    After-Action Report: Flashpoint Remediation of 0-Day Exploit on Our Public-Facing Website
    Today, researcher Dancho Danchev published a blog post that incorrectly reported that Flashpoint’s ...
    Read post
    Cyber Threat Intelligence
    Evaluating Cyber and Physical Risks During International Travel
    Whether for business or pleasure, international travel can present various cyber and physical risks. ...
    Read post
    Data Breaches
    A Breakdown and Analysis of the December, 2014 Sony Hack
    On November 25, a new chapter was added to the chronicles of data theft activity. A group calling itself GOP or ...
    Read post
    There are no results that match your criteria.