Platform
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Flashpoint Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Professional Services
Threat Response & Readiness
Threat Actor Engagment & Procurement
Enhanced Monitoring
Solutions
By Threats and Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Unveiling the Top 4 Cyber Threats in 2024
Threat Intel Blog
Events & Webinars
Resource Library
Cybersecurity Glossary
Partners
Why Flashpoint
Company
Flashpoint News
Flashpoint Cements Status as Industry’s Best Threat Data and Intelligence
About Us
Careers
News
Contact Us
Get a Demo
Platform
Our Platform
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Services
Threat Readiness and Response
Professional Services
Tailored Reporting
Curated Alerting
Managed Intelligence
Request for Information
Solutions
By Threats and Risks
Financial Fraud
Ransomware and Data Extortion
Account Takeover
Brand Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Why Flashpoint?
Resource Library
Threat Intelligence Blog
Events & Webinars
Resource Library
Cybersecurity & Intelligence 101
Partner With Flashpoint
Company
About Us
Flashpoint Careers
Flashpoint News
Contact Us
Get a Demo
Platform
Products
Flashpoint Ignite
Cyber Threat Intelligence
Vulnerability Intelligence (VulnDB)
Physical Security Intelligence
National Security Intelligence
Managed Attribution
Flashpoint Integrations
Services
Managed Intelligence
Curated Alerting
Proactive Acquisitions
Tailored Reporting Service
Request for Information (RFI)
Professional Services
Threat Response & Readiness
Threat Actor Engagment & Procurement
Enhanced Monitoring
Solutions
By Threats and Risks
Fraud
Ransomware
Account Takeover
Brand and Reputation
Vulnerability
Physical Security
National Security
By Industry
Financial Services
Retail
Healthcare & Pharmaceutical
Technology
Public Sector & National Security
Resources
Blog Article
Unveiling the Top 4 Cyber Threats in 2024
Threat Intel Blog
Events & Webinars
Resource Library
Cybersecurity Glossary
Partners
Why Flashpoint
Company
Flashpoint News
Flashpoint Cements Status as Industry’s Best Threat Data and Intelligence
About Us
Careers
News
Contact Us
Get a Demo
Flashpoint Intelligence Platform
Flashpoint Named 2024 Product Leader by Frost & Sullivan
Flashpoint is a leader of threat intelligence, enabling global organizations to address current security ...
Read post
Vulnerability Management
FP-2023-03 – ThinManager
Rockwell Automation ThinManager contains a flaw that allows traversing outside of a restricted path and allows a ...
Read post
Vulnerability Management
FP-2023-004-Automa Extension for Chrome Message Handling Universal XSS
Exploitation of this issue allows a universal cross-site scripting attack. If a user visits a specially crafted ...
Read post
Vulnerability Management
FP-2023-01 – NETGEAR’s ProSAFE® Network Management System NMS300
Flashpoint disclosed a new vulnerability affecting NETGEAR's ProSAFE® Network Management System NMS300.
Read post
Vulnerability Management
RBS-2022-002 – Delta Infrasuite Device Master
A function that handles GET requests does not enforce any authentication and allows to request any file e.g. in ...
Read post
Vulnerability Management
RBS-2022-001 – NetModule Router Software (NRSW)
NetModule Router Software (NRSW) contains PHP type juggling flaws. With specially crafted HTTP requests, a remote ...
Read post
Vulnerability Management
2021 Year End Report | Vulnerability QuickView
Conducted by Brian Martin, Vice President of Vulnerability Intelligence at Risk Based Security (RBS) and ...
Read post
Cyber Threat Intelligence
2021 Year End Report | Data Breach QuickView
In the 2021 Data Breach QuickView report from Risk Based Security, Inga Goddijn, Executive Vice President of ...
Read post
Cyber Threat Intelligence
Investigate Hydra: Where Cryptocurrency Cybercrime Goes Dark
Flashpoint and Chainalysis Investigate Cryptocurrency Cybercrime on Russian Dark Market “Hydra”
Read post
Vulnerability Management
RBS-2021-003 – Twonky Server
Vulnerabilities allow a remote attacker to gain access to sensitive information, such as the configured ...
Read post
Cyber Threat Intelligence
Joker’s Stash Post-Mortem: Where Will Cybercriminals Go Now?
After six years as the preeminent illicit card fraud marketplace, Joker’s Stash is set to officially shutter ...
Read post
Data Breaches
Data Breach Sales: What’s Trending on the Dark Web?
Resources > Research Data Breach Sales: What’s Trending on the Dark Web? Financial, Retail, and Healthcare ...
Read post