Platform
Product Tours
Why Flashpoint?
Tour the Flashpoint platform – at your own pace, on your own time.
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Integrations
Threat Intelligence Platforms (TIP)
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management (SIEM)
Analysis & Investigations
Product Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats & Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Navigating 2025’s Midyear Threats: Flashpoint’s GTII
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Why Flashpoint
Flashpoint vs. The Competition
Customer Stories
Pricing
Get a Demo
Platform
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Integrations
Threat Intelligence Platforms
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management
Analysis and Investigations
Product Integrations
Product Tours
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats & Risks
Financial Fraud
Ransomware and Data Extortion
Account Takeover
Brand Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Why Flashpoint?
Flashpoint vs. The Competition
Customer Stories
Resource Library
Threat Intelligence Blog
Events & Webinars
Resource Library
Cybersecurity & Intelligence 101
Partner With Flashpoint
Pricing
Get a Demo
Platform
Product Tours
Why Flashpoint?
Tour the Flashpoint platform – at your own pace, on your own time.
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Integrations
Threat Intelligence Platforms (TIP)
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management (SIEM)
Analysis & Investigations
Product Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats & Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Navigating 2025’s Midyear Threats: Flashpoint’s GTII
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Why Flashpoint
Flashpoint vs. The Competition
Customer Stories
Pricing
Get a Demo
Posts Tagged With
threat actor
Cyber Threat Intelligence
A New Threat Frontier: Leveraging Discord for OSINT
In this post we unpack insights from our latest webinar detailing the rising significance of Discord for ...
Read post
Cyber Threat Intelligence
Scattered Spider: A Threat Profile
In this post, we break down Scattered Spider’s history, their recent campaigns, and their evolving tactics, ...
Read post
Cyber Threat Intelligence
Inside the LockBit Leak: Rare Insights Into Their Operations
In this post, we delve into the significant data breach affecting the LockBit ransomware group. This leak ...
Read post
Cyber Threat Intelligence
Flashpoint Investigation: Uncovering the DPRK’s Remote IT Worker Fraud Scheme
In this post, we dive into Flashpoints investigation of a multi-million dollar North Korean remote IT worker ...
Read post
Cyber Threat Intelligence
The Top Threat Actor Groups Targeting the Financial Sector
In this post, we identify and analyze the top threat actors that have been actively targeting the financial ...
Read post
Cyber Threat Intelligence
May You Live in Interesting Times: The Rise and Fall of Threat Actors
Navigating the turbulent cybercrime landscape requires proactive measures and strategic intelligence to turn ...
Read post
Ransomware
Staying Ahead of Threat Actors: Flashpoint’s 2025 Ransomware Survival Guide
Our new ebook provides actionable strategies to help organizations survive and thrive in the face of evolving ...
Read post
Cyber Threat Intelligence
FSB-Linked Star Blizzard Campaign Disrupted: What You Need to Know
The Russian hacking group Star Blizzard has been disrupted, but the threat remains.
Read post
Current Events
Navigating the Rise in Cybersecurity Threats in Wake of the CrowdStrike Outage
Flashpoint has observed a surge in phishing attempts by threat actors aiming to exploit the largest global IT ...
Read post
Cyber Threat Intelligence
Understanding Seidr Infostealer Malware
Flashpoint has observed a notable surge in advertised sales of infostealers throughout 2024—among them is Seidr ...
Read post
Vulnerability Management
XZ Utils and the Critical Role of Vulnerability Intelligence
The discovery of the recent XZ Utils vulnerability once again highlights the importance of comprehensive ...
Read post
Cyber Threat Intelligence
The Evolution and Rise of Stealer Malware
Threat actors are increasingly selling and purchasing information-stealing malware on illicit marketplaces. Learn ...
Read post