Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Illicit Communities
    Threat Actors Leverage “Phonecord” Bot to Harass Victims
    Although the majority of cyber threat actors are fueled by the desire for financial or political gain, some ...
    Read post
    Cyber Threat Intelligence
    Dataset from “xDedic” Marketplace Suggests Government, Corporate RDP Servers Targeted
    The xDedic marketplace is a predominant cybercriminal marketplace on the dark web known for hosting sales of ...
    Read post
    Cyber Threat Intelligence
    Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies
    Malicious actors’ widespread preference for encrypted tools and services continues to fuel the ongoing debate ...
    Read post
    Cyber Threat Intelligence
    Jihadists and Vault 7: What it Means for the Rest of Us
    The so-called Vault 7 files released by Wikileaks that describe the Central Intelligence Agency’s electronic ...
    Read post
    Cyber Threat Intelligence
    Evaluating Cyber and Physical Risks During International Travel
    Whether for business or pleasure, international travel can present various cyber and physical risks. ...
    Read post
    Cyber Threat Intelligence
    Psychology of an Eastern European Cybercriminal: Mindset Drives Behavior
    Eastern European cybercriminals operate within the context of many unique social, cultural, and economical ...
    Read post
    Vulnerability Management
    Understanding CVSSv2 and CVSSv3: How It Works and Their Shortcomings
    The Common Vulnerability Scoring System (CVSS) is currently developed and managed by FIRST.Org, Inc. (FIRST), a ...
    Read post
    Cyber Threat Intelligence
    In the financial cybercrime landscape, we see a continuous progression of the malware known as “Floki Bot,” ...
    Read post
    Cyber Threat Intelligence
    Inside an Iranian Hacker Collective: An Exclusive Flashpoint Interview with Parastoo
    Over the past five years, this hacking group has been credited with attacks targeting IHS Jane’s, the National ...
    Read post
    Cyber Threat Intelligence
    Islamic State-Linked Hacker and Abu Hussain Al Britani Associate Arrested for Leak of U.S. Military and Government Personnel Information
    Federal prosecutors in the U.S. unsealed a criminal complaint charging Kosovo citizen Ardit Ferizi, aka ...
    Read post
    Data Breaches
    Flashpoint Heat Map: Concentration of Users Accessing AshleyMadison.com Data Dump on the Deep Web
    This heat map showing the geographic concentration of individuals accessing a data dump allegedly stolen from ...
    Read post
    Data Breaches
    A Breakdown and Analysis of the December, 2014 Sony Hack
    On November 25, a new chapter was added to the chronicles of data theft activity. A group calling itself GOP or ...
    Read post
    There are no results that match your criteria.