Platform
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Flashpoint Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Professional Services
Threat Response & Readiness
Threat Actor Engagment & Procurement
Enhanced Monitoring
Solutions
By Threats and Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Unveiling the Top 4 Cyber Threats in 2024
Threat Intel Blog
Events & Webinars
Resource Library
Cybersecurity Glossary
Partners
Why Flashpoint
Company
Flashpoint News
Flashpoint Cements Status as Industry’s Best Threat Data and Intelligence
About Us
Careers
News
Contact Us
Get a Demo
Platform
Our Platform
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Threat Readiness and Response
Professional Services
Tailored Reporting
Curated Alerting
Managed Intelligence
Request for Information
Solutions
By Threats and Risks
Financial Fraud
Ransomware and Data Extortion
Account Takeover
Brand Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Why Flashpoint?
Resource Library
Threat Intelligence Blog
Events & Webinars
Resource Library
Cybersecurity & Intelligence 101
Partner With Flashpoint
Company
About Us
Flashpoint Careers
Flashpoint News
Contact Us
Get a Demo
Platform
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Flashpoint Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Professional Services
Threat Response & Readiness
Threat Actor Engagment & Procurement
Enhanced Monitoring
Solutions
By Threats and Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Unveiling the Top 4 Cyber Threats in 2024
Threat Intel Blog
Events & Webinars
Resource Library
Cybersecurity Glossary
Partners
Why Flashpoint
Company
Flashpoint News
Flashpoint Cements Status as Industry’s Best Threat Data and Intelligence
About Us
Careers
News
Contact Us
Get a Demo
Blogs
Written By:
Curtis Kang
Flashpoint
Flashpoint a Strong Performer in External Threat Intelligence Forrester Wave
Forrester has named Flashpoint a Strong Performer in The Forrester Wave™: External Threat Intelligence Service ...
Read post
Cyber Threat Intelligence
Threat Actors and APTs Target Australia, Stealing Over 50 Million Credentials
2022 has been an auspicious year for threat actors and Advanced Persistent Threat (APT) groups targeting ...
Read post
Cyber Threat Intelligence
What You Need to Know About the Cyber Threat Landscape in 2023
Our new report dives into the perpetual cycles of cybercrime and shows organizations how consolidated ...
Read post
Cyber Threat Intelligence
3 Key Takeaways From Our New Russia-Ukraine War Report
Flashpoints new report details the importance of OSINT in Russias invasion of Ukraine through the lens of ten ...
Read post
Vulnerability Management
What You Need to Know About the Apache Commons Text Flaw (CVE-2022-42889)
Vulnerability researchers and media sources are paying a lot of attention to CVE-2022-42889, a vulnerability ...
Read post
Vulnerability Management
Why Vulnerability Management Programs Need Visibility Into Over 300,000 Vulnerabilities
Flashpoint has been identifying and collecting vulnerabilities as they become available—with VulnDB now ...
Read post
Vulnerability Management
How to Comply With the DoD’s Newer and Stricter Software Requirements
We break down H.R. 7900, a well-intentioned but perhaps unrealistic bill that requires companies working with the ...
Read post
Vulnerability Management
What Is an SBOM? The Importance of a Software Bill of Materials
Cyber attacks like Log4Shell have led the Biden administration to work closely with security experts, as well as ...
Read post
Data Breaches
1,980 Data Breaches Were Reported in 2022 H1 and 60% Were the Result of Hacking
Today, Flashpoint releases the State of Data Breach Intelligence: 2022 Midyear Edition, which covers publicly ...
Read post
Vulnerability Management
Organizations Deploying NetModule Router Software May Be Vulnerable to Exploitation
Flashpoint discovered two new critical vulnerabilities affecting NetModule Router Software (NRSW), which could ...
Read post
Vulnerability Management
CVE/NVD Failed to Report and Detail 27.3% of Vulnerabilities in 2022 H1
Today, Flashpoint releases the State of Vulnerability Intelligence: 2022 Midyear Edition, a report designed to ...
Read post
Vulnerability Management
Hackers Are Still Exploiting Log4Shell Vulnerability, Warns CISA
Yesterday, CISA and US Coast Guard Cyber Command (CGCYBER) warned that nation-state hackers are still exploiting ...
Read post