Threat Intel Blog

Informative, solution-oriented content for security practitioners — from breaking news, expert analysis, and thought leadership to essential guides, articles, videos, blogs, and more.

What interests you?
  • Corporate and Physical Security
  • Court documents
  • Current events
  • Cyber threat intelligence
  • Data breaches
  • Flashpoint
  • Fraud
  • Illicit communities
  • Insider threats
  • Product features
  • Public Sector and Government
  • Ransomware
  • Vulnerability management
    clear all
    Vulnerability Management
    Why Vulnerability Management Programs Need Visibility Into Over 300,000 Vulnerabilities
    Flashpoint has been identifying and collecting vulnerabilities as they become available—with VulnDB now ...
    Read post
    Current events
    How Russians Are Reacting to Putin’s Conscription Gamble
    Real-time data from Russian social media platforms and related illicit communities is vital to understanding the ...
    Read post
    Cyber Threat Intelligence
    What We Know About The ‘Grand Theft Auto VI’ Data Breach
    On September 18, a cyber threat actor named “teapotuberhacker” posted on GTAForums.com claiming to have ...
    Read post
    Cyber Threat Intelligence
    What Is Cryptojacking? How It Works and How to Protect Against It
    Cryptojacking is the unauthorized use of another computer to “mine” cryptocurrency—using them to run ...
    Read post
    Current events
    Situational Awareness in Russia: Neo-Nazi Mercenary Groups, PMCs, and Illicit Financing
    Russian mercenary groups and private military companies are operating in Ukraine, including the Russian Imperial ...
    Read post
    Court documents
    COURT DOC: USA v. Mansour Ahmadi, Ahmad Khatibi, Amir Hossein Nickaein Ravari
    On Wednesday an indictment was unsealed charging three Iranian nationals with allegedly orchestrating a scheme to ...
    Read post
    Current events
    After Al-Zawahiri: The Future of Al-Qaeda Leadership
    A look at Ayman al-Zawahiri's influence and legacy, plus how the future of al-Qaeda could take shape.
    Read post
    Cyber Threat Intelligence
    WT1SHOP: Authorities Seize Online Marketplace Selling Stolen Login Credentials and Other PII
    The United States Department of Justice released a notice on Tuesday detailing the seizure of an online ...
    Read post
    Cyber Threat Intelligence
    Three Types of Threat Intelligence: Defined and Explained
    Depending on why it’s collected and what information it yields, the umbrella of threat intelligence can be ...
    Read post
    Cyber Threat Intelligence
    Five Must-Have Skills Every Cyber Threat Intel Analyst Should Possess
    Cyber threat intelligence analysts play an indispensable role in helping organizations understand their threat ...
    Read post
    Current events
    Russian Journalist Zayakin Detained For Donating $16 to Navalny’s Anti-Corruption Foundation
    Russian authorities have arrested Andrey Zayakin, one of the editors of the “Dissernet” investigative ...
    Read post
    Illicit communities
    AlphaBay Turns 1—Again: Analyzing the Impact of AlphaBay Market
    One year into its reemergence, AlphaBay has become one of the largest illicit marketplaces on the darknet—and ...
    Read post
    Load more
    There are no results that match your criteria.

    Subscribe to our threat intelligence newsletter

    Interested to see top news from Flashpoint hit your inbox directly? Subscribe to our newsletter to receive curated content on a regular basis.