Posts Tagged With

threat intel

Cyber Threat Intelligence
The Israel-Iran Conflict Through an Intelligence Lens
Examining the strategic intelligence, cyber tactics, and physical confrontations that define the enduring ...
Read post
Flashpoint
Automated Source Discovery: How Flashpoint AI Rapidly Scales the Intelligence Collection Process
Automated Source Discovery (ASD) is more than just a tool; it’s an essential component of an innovative ...
Read post
Cyber Threat Intelligence
The Emerging Threat of PikaBot Malware
Flashpoint analysts have been observing a steady emergence of PikaBot, as well as a continuous modification of ...
Read post
Cyber Threat Intelligence
The Evolution and Rise of Stealer Malware
Threat actors are increasingly selling and purchasing information-stealing malware on illicit marketplaces. Learn ...
Read post
Cyber Threat Intelligence
The Israel-Hamas War: Insights Through an Intelligence Lens
Flashpoint delves into the Israel-Hamas War (Israel-Gaza War)—reporting on observed and potential cyber threats ...
Read post
Cyber Threat Intelligence
The New Release of Danabot Version 3: What You Need to Know
Flashpoint analysts are tracking the newly released “DBot v.3,” the third version of the well-known malware ...
Read post
Cyber Threat Intelligence
What is Deepfake Technology and How Are Threat Actors Using It?
Deepfake technology is a form of artificial intelligence that employs machine learning algorithms to generate ...
Read post
Cyber Threat Intelligence
What You Need to Know About the Cyber Threat Landscape in 2023
Our new report dives into the perpetual cycles of cybercrime and shows organizations how consolidated ...
Read post
Cyber Threat Intelligence
Flashpoint Year In Review: 2022 Healthcare Threat Landscape
According to a recent study, more than 20 percent of surveyed healthcare organizations experienced an increase in ...
Read post
Cyber Threat Intelligence
Flashpoint Year In Review: 2022 Breaches and Malware Threat Landscape
Mostly motivated by greed, threat actors will target any organization regardless of sector. Therefore, data ...
Read post
Vulnerability Management
Timeline: CISA and the Biden Administration’s Impact on Cybersecurity
The US president and Cybersecurity and Infrastructure Security Agency, or CISA, has steadily followed through ...
Read post
Cyber Threat Intelligence
Three Types of Threat Intelligence: Defined and Explained
Depending on why it’s collected and what information it yields, the umbrella of threat intelligence can be ...
Read post