Platform
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Flashpoint Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagment & Procurement
Enhanced Monitoring
Solutions
By Threats and Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Flashpoint 2025 Global Threat Intelligence Report: Stay Ahead of Emerging Threats
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Flashpoint vs. The Competition
Customer Stories
Company
Flashpoint Research
The Flashpoint 2025 Global Threat Intelligence Report
About Us
Careers
News
Contact Us
Pricing
Get a Demo
Platform
Our Platform
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Threat Readiness and Response
Professional Services
Tailored Reporting
Curated Alerting
Managed Intelligence
Request for Information
Event Monitoring
Person of Interest/Executive Investigation Services
Solutions
By Threats and Risks
Financial Fraud
Ransomware and Data Extortion
Account Takeover
Brand Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Why Flashpoint?
Flashpoint vs. The Competition
Customer Stories
Resource Library
Threat Intelligence Blog
Events & Webinars
Resource Library
Cybersecurity & Intelligence 101
Partner With Flashpoint
Company
About Us
Flashpoint Careers
Flashpoint News
Contact Us
Pricing
Get a Demo
Platform
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Flashpoint Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagment & Procurement
Enhanced Monitoring
Solutions
By Threats and Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Flashpoint 2025 Global Threat Intelligence Report: Stay Ahead of Emerging Threats
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Flashpoint vs. The Competition
Customer Stories
Company
Flashpoint Research
The Flashpoint 2025 Global Threat Intelligence Report
About Us
Careers
News
Contact Us
Pricing
Get a Demo
Posts Tagged With
Malware
Featured
Operation Endgame: Global Law Enforcement Takes Down DanaBot Malware Scheme
Flashpoint is proud to have supported this investigation as part of an alliance of government agencies and ...
Read post
Cyber Threat Intelligence
IOCONTROL Malware: A New Threat Targeting Critical Infrastructure
This blog delves into the technical intricacies of IOCONTROL, its attribution, and the potential implications for ...
Read post
Product Features
Flashpoint Intelligence: Delivering Actionable Data for a Safer World
Flashpoint delivers cutting-edge technology, actionable data, and unparalleled expertise, empowering security ...
Read post
Cyber Threat Intelligence
RedLine and META Takedown: A Turning Point in the Infostealer Landscape?
In this blog we explore the impact these stealers have had on the threat landscape and the aftermath of their ...
Read post
Cyber Threat Intelligence
Grandoreiro Malware: Spear Phishing, Outlook Exploits, and More
In this blog, we explain what Grandoreiro malware is, how it works, and how organizations can protect themselves ...
Read post
Cyber Threat Intelligence
Understanding and Protecting Against Infostealer Malware: A Comprehensive Guide
In this blog we outline the essential steps that organizations can take to safeguard against infostealer malware.
Read post
Cyber Threat Intelligence
Understanding Seidr Infostealer Malware
Flashpoint has observed a notable surge in advertised sales of infostealers throughout 2024—among them is Seidr ...
Read post
Cyber Threat Intelligence
The Emerging Threat of PikaBot Malware
Flashpoint analysts have been observing a steady emergence of PikaBot, as well as a continuous modification of ...
Read post
Cyber Threat Intelligence
The Evolution and Rise of Stealer Malware
Threat actors are increasingly selling and purchasing information-stealing malware on illicit marketplaces. Learn ...
Read post
Cyber Threat Intelligence
Cyber Threat Intelligence Index: Q3 2023 Edition
Data, insights, and analysis on the most impactful events and threats that took place between July 1, 2023 to ...
Read post
Cyber Threat Intelligence
Cyber Threat Intelligence Index: 2023 Midyear
Data, insights, and analysis on the most impactful events and threats of 2023 so far—from ransomware and ...
Read post
Cyber Threat Intelligence
The New Release of Danabot Version 3: What You Need to Know
Flashpoint analysts are tracking the newly released “DBot v.3,” the third version of the well-known malware ...
Read post