Illicit Telegram Groups: A New Dark Web Frontier?

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Illicit Telegram Groups: A New Dark Web Frontier?" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The shady underworld of the dark web provides cybercriminals with an outlet to trade stolen information, tools, or malware, hold victims of cyber attacks to ransom, and discuss their targets and tactics. But the dark web forums that normally host illicit marketplaces and discussions are starting to lose their allure. Find out why the messaging […]

Threat Intelligence Feeds: 9 Valuable Sources of CTI

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Intelligence Feeds: 9 Valuable Sources of CTI." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Among the many available sources of cyber threat intelligence (CTI), threat intelligence feeds are incredibly valuable for staying informed about the latest threats and potential indicators about those threats. Whether observed in the wild and reported by real users or gathered by decoy systems that lure attackers in, threat intel feeds should not be overlooked.  […]

Operational Threat Intelligence: The Definitive Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Attack Surface Monitoring: The Definitive 2022 Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Cyber threat intelligence involves gathering and analyzing an assortment of disparate data to help make prompt and effective security decisions related to current or potential attacks and adversaries. But simply lumping all of this information under a general label like “cyber threat intelligence” ignores the fact that there are different ways to categorize this data […]

Data Breach Prevention: Identifying Leaked Credentials on the Dark Web

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Data Breach Prevention: Identifying Credentials on the Dark Web." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat actors deploy many tactics, techniques and procedures (TTPs) to get access to sensitive data assets. Among this arsenal of weapons, obtaining correct user credentials (username and password pairs) that can be used for credential stuffing attacks plays a central role in most data breaches.  Poor password hygiene makes some credentials easy to guess. Social engineering […]

The Threat Intelligence Lifecycle: A Definitive Guide for 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "The Threat Intelligence Lifecycle: A Definitive Guide for 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Building an effective threat intelligence program that disseminates actionable data that results in real-world risk reduction has never been more critical than in 2023. Threats to enterprise organizations ranging from geopolitical risk to sophisticated ransomware groups continue to proliferate while many security teams struggle to integrate dozens of tools together and stay on top of […]

Threat Intelligence in 2023: The Definitive Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Intelligence in 2023: The Definitive Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat Intelligence provides organizations with timely, relevant information about threats to their business. Threat intelligence can come in many different forms and includes four primary layers, strategic threat intelligence, tactical threat intelligence, operational threat intelligence, and technical threat intelligence. Organizations with mature threat intelligence functions in place are able to effectively collect intelligence from hundreds […]

Threat Spotlight: 12 Days of Threats

White text "12 Days of Threats" over navy patterned background

Executive Summary 1. Russian Market (Infected Devices & the Growing Threat of Stealer Malware) Infected device markets sell access to infected computers and browser fingerprints that can be used by threat actors to compromise online accounts. Like identity theft, the infected device can reveal a wealth of personal information about the victim, like where they […]

OSINT in Cybersecurity: Effectively Leveraging Open-Source Intelligence to Drive Enterprise Security Value in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "OSINT in Cybersecurity: Effectively Leveraging Open Source Intelligence to Drive Enterprise Security Value." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

OSINT is a critical aspect of a competent cybersecurity program. Once an organization has the basics in place such as EDR, multi-factor authentication, network monitoring, and robust firewall rules, conducting effective open-source intelligence represents a significant opportunity for organizations to improve their cyber readiness. Cybersecurity OSINT enables companies to: What is Open Source Intelligence (OSINT)? […]

Attack Surface Monitoring: The Definitive 2023 Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Attack Surface Monitoring: The Definitive Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Today’s threat actors constantly probe your IT ecosystem for ways to gain unauthorized access and achieve their goals. Thinking like an attacker to figure out the paths of least resistance into your environment is imperative in protecting your digital assets and thwarting attacks. These paths together make up your attack surface—the complete set of entry […]

Our CTF is Currently Closed – Please Check Back Later

CTF The text Capture the Threats in orange over a dark blue background. There is a cartoon man with a Flare logo on his shirt holding a net.

Our CTF: Capture the Threats is currently closed. Please check here or follow our social media for for further updates: • LinkedIn • Twitter • Facebook We’ve launched CTF: Capture the Threats so you can upgrade your threat hunting skills while having fun. The game includes four categories of 12 challenges to stop a threat […]