Platform
Product Tours
Why Flashpoint?
Tour the Flashpoint platform – at your own pace, on your own time.
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Integrations
Threat Intelligence Platforms (TIP)
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management (SIEM)
Analysis & Investigations
Product Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats and Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Navigating 2025’s Midyear Threats: Flashpoint’s GTII
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Flashpoint vs. The Competition
Customer Stories
Pricing
Get a Demo
Platform
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Integrations
Threat Intelligence Platforms
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management
Analysis and Investigations
Product Integrations
Product Tours
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats and Risks
Financial Fraud
Ransomware and Data Extortion
Account Takeover
Brand Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Why Flashpoint?
Flashpoint vs. The Competition
Customer Stories
Resource Library
Threat Intelligence Blog
Events & Webinars
Resource Library
Cybersecurity & Intelligence 101
Partner With Flashpoint
Pricing
Get a Demo
Platform
Product Tours
Why Flashpoint?
Tour the Flashpoint platform – at your own pace, on your own time.
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Integrations
Threat Intelligence Platforms (TIP)
Security Orchestration, Automation, and Response (SOAR)
Security Information & Event Management (SIEM)
Analysis & Investigations
Product Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Event Monitoring
Person of Interest/Executive Investigations
Professional Services
Threat Response & Readiness
Threat Actor Engagement & Procurement
Enhanced Monitoring
Solutions
By Threats and Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Navigating 2025’s Midyear Threats: Flashpoint’s GTII
Threat Intel Blog
Events & Webinars
Resource Library
Intelligence Glossary
Partners
Why Flashpoint
WHY FLASHPOINT
Comprehensive Intelligence for Mission-Critical Teams
Flashpoint vs. The Competition
Customer Stories
Pricing
Get a Demo
Posts in Category
Fraud
Illicit Communities
How The Carding Landscape Has Evolved: From Key Collections to Pandemic Implications
We’re in an interesting and unprecedented time for not only businesses focusing on day-to-day operations, but ...
Read post
Cyber Threat Intelligence
Emerging Trends in QR Code Fraud
QR codes, square-shaped machine readable codes, allow consumers to download apps, initiate customer service, ...
Read post
Illicit Communities
Mail Services an Emerging Vector for Financial Fraud
Threat actors are not shy about using a legitimate means to satisfy their own goals. They leverage commercial and ...
Read post
Cyber Threat Intelligence
Inside Payment Card Fraud: Part 2
In Inside Payment Card Fraud: Part 1, we examined why carding remains pervasive despite ongoing efforts to quash ...
Read post
Cyber Threat Intelligence
Inside Payment Card Fraud: Part 1
Payment card fraud, arguably one of the most straightforward approaches to financially motivated crime, persists ...
Read post
Illicit Communities
Fake ID Fabrication in Race with Anti-Fraud Measures
United States government-issued identification cards are replete with anti-fraud measures such as ultraviolet ink ...
Read post
Illicit Communities
Synthetic Identity Theft a Gateway to Business Fraud
As losses directly attributable to synthetic identity theft mount, it’s inevitable that we see it leveraged for ...
Read post
Cyber Threat Intelligence
The Fraud Intelligence Cycle
Usage of the intelligence cycle in the commercial sector is often relegated—and in many cases, exclusively ...
Read post
Illicit Communities
Cybercriminals Exhibit Interest in Targeting Contactless Payments in Latin America
Unlike cash or traditional credit or debit cards, contactless payment methods enable users to make purchases by ...
Read post
Vulnerability Management
Threat-Actor Opportunism at Peak During Holiday Season
Attackers’ opportunism is never higher during the year than in the holiday shopping season. As a result, ...
Read post
Illicit Communities
Why Fraud Teams Need Visibility into Underground Card Shops
Underground card shops play a crucial role in the fraud ecosystem. They provide threat actors with a platform to ...
Read post
Illicit Communities
Fraud and Cybercrime Aren’t Just Seasonal Threats to Retailers
Thanksgiving in the United States is not only a harbinger of the holiday season but also of a predictable barrage ...
Read post