Platform
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Flashpoint Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagment & Procurement
Enhanced Monitoring
Solutions
By Threats and Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Flashpoint 2025 Global Threat Intelligence Report: Stay Ahead of Emerging Threats
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Flashpoint vs. The Competition
Customer Stories
Company
Flashpoint Research
The Flashpoint 2025 Global Threat Intelligence Report
About Us
Careers
News
Contact Us
Pricing
Get a Demo
Platform
Our Platform
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Threat Readiness and Response
Professional Services
Tailored Reporting
Curated Alerting
Managed Intelligence
Request for Information
Event Monitoring
Person of Interest/Executive Investigation Services
Solutions
By Threats and Risks
Financial Fraud
Ransomware and Data Extortion
Account Takeover
Brand Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Why Flashpoint?
Flashpoint vs. The Competition
Customer Stories
Resource Library
Threat Intelligence Blog
Events & Webinars
Resource Library
Cybersecurity & Intelligence 101
Partner With Flashpoint
Company
About Us
Flashpoint Careers
Flashpoint News
Contact Us
Pricing
Get a Demo
Platform
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Flashpoint Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagment & Procurement
Enhanced Monitoring
Solutions
By Threats and Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Flashpoint 2025 Global Threat Intelligence Report: Stay Ahead of Emerging Threats
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Flashpoint vs. The Competition
Customer Stories
Company
Flashpoint Research
The Flashpoint 2025 Global Threat Intelligence Report
About Us
Careers
News
Contact Us
Pricing
Get a Demo
Posts Tagged With
cryptocurrency
Cyber Threat Intelligence
Enhancing Cryptocurrency Investigations: Flashpoint Partners with TRM Labs
Flashpoint joins forces with TRM Labs, the global leader in blockchain intelligence.
Read post
Cyber Threat Intelligence
Grandoreiro Malware: Spear Phishing, Outlook Exploits, and More
In this blog, we explain what Grandoreiro malware is, how it works, and how organizations can protect themselves ...
Read post
Cyber Threat Intelligence
Flashpoint Year In Review: 2022 Cryptocurrency Threat Landscape
Throughout 2022, threat actors committed fraud targeting cryptocurrency entities, investors, and users. ...
Read post
Cyber Threat Intelligence
What Is Cryptojacking? How It Works and How to Protect Against It
Cryptojacking is the unauthorized use of another computer to “mine” cryptocurrency—using them to run ...
Read post
Cyber Threat Intelligence
Definitive Guide to Ransomware: What It Is and How Your Organization Can Prevent, Detect, and Respond to a Ransomware Attack
A guide to defining, explaining, and understanding ransomware to bolster your organizations security posture ...
Read post
Cyber Threat Intelligence
Funding and the Russia-Ukraine War: KYC for Crypto Transactions Proving Difficult
Flashpoint analysts have uncovered 262 cryptocurrency addresses used in advertisements for donations to either ...
Read post
Cyber Threat Intelligence
Why the New AlphaBay Matters: Anonymity, Cryptocurrency, and the Future of Illicit Marketplaces
On July 5, 2017, AlphaBay—the original AlphaBay—was notoriously shut down along with Hansa. The cybercrime ...
Read post
Cyber Threat Intelligence
Investigating Hydra: Where Cryptocurrency Roads All Lead to Russia and Go Dark
In new research, we detail the inner workings of cybercriminal cryptocurrency financial chains and the rise to ...
Read post
Cyber Threat Intelligence
Cryptocurrency Risks to Consider: From Cryptomining to Money Laundering
In the not-so-distant past, cybercriminal use of cryptocurrency was largely limited to using Bitcoin or Monero as ...
Read post
Cyber Threat Intelligence
Malware Campaign Targeting Jaxx Cryptocurrency Wallet Users Shut Down
A website spoofing the official Jaxx cryptocurrency wallet site has been taken down after analysts at Flashpoint ...
Read post
Cyber Threat Intelligence
Peer-to-Peer Cryptocurrency Exchanges Abused in Cash-Out Schemes
Cybercriminals responding to security measures such as Know-Your-Customer implemented by Coinbase and other ...
Read post
Cyber Threat Intelligence
The Many Faces of Cryptocurrency
While it may be a bit harsh to label it the currency of crime, Bitcoin and its dozens of cryptocash cousins ...
Read post