Threat Intel Blog

Informative, solution-oriented content for security practitioners — from breaking news, expert analysis, and thought leadership to essential guides, articles, videos, blogs, and more.

What interests you?
  • Corporate and Physical Security
  • Court documents
  • Current events
  • Cyber threat intelligence
  • Data breaches
  • Flashpoint
  • Fraud
  • Illicit communities
  • Insider threats
  • Product features
  • Public Sector and Government
  • Ransomware
  • Vulnerability management
    clear all
    Product features
    Security Automation Crash Course: Which Workflows Should I Automate?
    Outlining the factors that should impact how risk and intelligence teams choose which security workflows to ...
    Read post
    Cyber Threat Intelligence
    Social Media Intelligence: Addressing National Security Challenges with SOCMINT
    Social media intelligence is a relatively new intelligence discipline in the public sector. Emerging SOCMINT ...
    Read post
    Prevent Card Fraud With High-Risk Merchants Data: Common Point of Purchase Analysis Made Easy 
    Flashpoint takes CPP analysis and risky merchants off your plate, with our new High-risk Merchant data built into ...
    Read post
    Data breaches
    1,980 Data Breaches Were Reported in 2022 H1 and 60% Were the Result of Hacking
    Today, Flashpoint releases the State of Data Breach Intelligence: 2022 Midyear Edition, which covers publicly ...
    Read post
    Vulnerability Management
    Organizations Deploying NetModule Router Software May Be Vulnerable to Exploitation
    Flashpoint discovered two new critical vulnerabilities affecting NetModule Router Software (NRSW), which could ...
    Read post
    Cyber Threat Intelligence
    Release the Kraken: The Battle for the Russian Language Darknet
    Hydra Market was shuttered by German and US law enforcement on April 5, 2022, leading to a competition for market ...
    Read post
    Corporate & Physical Security
    Terror Groups Silent after US Strike Kills al-Qaeda Leader Ayman Al-Zawahiri
    On August 1, 2022, US President Joe Biden announced that he authorized a drone strike to kill Ayman al-Zawahiri, ...
    Read post
    Court documents
    COURT DOC: USA v. Arian Taherzadeh and Haider Ali
    On August 1, 2022, Arian Taherzadeh pled guilty to charges stemming from a scheme in which he pretended to be a ...
    Read post
    Court documents
    COURT DOC: USA v. Aleksandr Viktorovich Ionov, aka “Alexander Ionov”, aka “Sasha”
    On July 29, 2022, an indictment was unsealed…in Tampa, Florida, charging a Russian national, working on behalf ...
    Read post
    Cyber Threat Intelligence
    What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape
    Open-source intelligence, or OSINT, refers to the process of gathering information from public, legal data ...
    Read post
    Vulnerability Management
    The Types of Zero-Day Vulnerabilities and How to Defend Against Them
    For many years, the term “zero-day” has been overused by news outlets and some security ...
    Read post
    Cyber Threat Intelligence
    The History and Evolution of Ransomware Attacks
    It’s imperative for all organizations to have a plan for how to prevent and respond to ransomware attacks. But ...
    Read post
    Load more
    There are no results that match your criteria.

    Subscribe to our threat intelligence newsletter

    Interested to see top news from Flashpoint hit your inbox directly? Subscribe to our newsletter to receive curated content on a regular basis.