Platform
Product Tours
Why Flashpoint?
Tour the Flashpoint platform – at your own pace, on your own time.
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Fraud Intelligence
Brand Intelligence
Geospatial Intelligence
Integrations
Threat Intelligence Platforms (TIP)
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management (SIEM)
Analysis & Investigations
Product Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats & Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Defense
Law Enforcement
Intelligence Community
Public Sector
Resources
New Resource
Threat Intelligence Capability Assessment
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Why Flashpoint
Flashpoint vs. The Competition
Switch to Flashpoint
Customer Stories
Artificial Intelligence
Primary Source Collection
Contact Us
Pricing
Get a Demo
Platform
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Threat Intelligence
National Security Intelligence
Integrations
Threat Intelligence Platforms
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management
Analysis and Investigations
Product Integrations
Product Tours
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats & Risks
Financial Fraud
Ransomware and Data Extortion
Account Takeover
Brand Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Why Flashpoint?
Flashpoint vs. The Competition
Switch to Flashpoint
Customer Stories
Resource Library
Threat Intelligence Blog
Events & Webinars
Resource Library
Cybersecurity & Intelligence 101
Partner With Flashpoint
Pricing
Get a Demo
Platform
Product Tours
Why Flashpoint?
Tour the Flashpoint platform – at your own pace, on your own time.
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Fraud Intelligence
Brand Intelligence
Geospatial Intelligence
Integrations
Threat Intelligence Platforms (TIP)
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management (SIEM)
Analysis & Investigations
Product Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats & Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Defense
Law Enforcement
Intelligence Community
Public Sector
Resources
New Resource
Threat Intelligence Capability Assessment
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Why Flashpoint
Flashpoint vs. The Competition
Switch to Flashpoint
Customer Stories
Artificial Intelligence
Primary Source Collection
Contact Us
Pricing
Get a Demo
Posts Tagged With
Fraud
Fraud
Credit Card Fraud: A Complete Guide to Prevention
Just launched, The Complete Guide to Credit Card Fraud and Prevention offers expert intelligence and practical ...
Read post
Flashpoint
FUSE 2025: How Security Leaders Are Operationalizing Flashpoint Intelligence to Thwart Rising Threats
In this post, we summarize the critical themes that emerged at FUSE 2025, detailing how security professionals ...
Read post
Cyber Threat Intelligence
Fact vs. Fiction: Cutting Through the Noise on AI-Powered Cyber Threats
In this post, Flashpoint analysts reveal what their teams are actively observing in threat actor communities, ...
Read post
Cyber Threat Intelligence
The DPRK Remote Worker Threat: Unmasking North Korea’s Digital Deception
In this post we unpack insights from our latest community call detailing how North Korean threat actors operate, ...
Read post
Fraud
What is E-Skimming? Detecting and Defending Against Digital Fraud
While attacks targeting ATMs have been around for virtually as long as the ATMs themselves, security awareness ...
Read post
Cyber Threat Intelligence
The Four Steps of Tax Refund Fraud: What You Need to Know
In this post we explore 2025’s most prevalent tax fraud schemes, detailing threat actor methods of obtaining ...
Read post
Cyber Threat Intelligence
2024 Holiday Season Cyber Threats: Gift Card Fraud & Phishing Schemes on the Rise
In this post, we explain the two biggest online threats facing retailers this year’s holiday season.
Read post
Product Features
Combat Credit Card Fraud with Flashpoint’s New Infostealer Data Integration
Flashpoint Fraud Intelligence now includes comprehensive infostealer data to proactively combat credit card fraud.
Read post
Fraud
Shielding Financial Assets from Cyber Threats Through Fraud Intelligence
Financial institutions are primary targets for cybercriminals. Attackers constantly find new ways to steal data ...
Read post
Flashpoint
Automated Source Discovery: How Flashpoint AI Rapidly Scales the Intelligence Collection Process
Automated Source Discovery (ASD) is more than just a tool; it’s an essential component of an innovative ...
Read post
Cyber Threat Intelligence
Introducing New Experiences in Flashpoint Ignite: Offering More Intelligence Possibilities
Today, we’re introducing a set of powerful new capabilities and enhancements that are designed to provide a ...
Read post
Court Documents
COURT DOC: Two Russian Nationals Charged in Separate Indictments with Fraud and Other Offenses Related to Hacking Campaigns
Two indictments were unsealed charging two Russian nationals – Aleksey Timofeyevich Stroganov and Tim Stigal ...
Read post