Financial institutions

Firework: Digital Risk Protection Product Brief

Solution Brief: Technical Data Leaks Detection Download the product document

Solution Brief: Detect Technical Data Leaks

Solution Brief: Technical Data Leaks Detection Download the product document

ransomware report

How Ransomware Groups Enhance Their Tactics with Double Extortion and Third-Party Targeting

How Ransomware Groups Enhance Their Tactics with Double Extortion and Third-Party Targeting Download the PDF version of the report Protect your digital assets and infrastructure not only by following basic security guidelines, but also by understanding the threat landscape. Download … Read More

Flare Systems Overview

Flare Systems Overview Download the product document

bank prevented a potentially costly breach

Bank Prevented a Potentially Costly Breach

Major Canadian Bank Prevents a Potentially Costly Breach Customer Success Story A large Canadian financial institution, who is Flare Systems’ customer and would prefer to remain anonymous, explains how it prevented a potentially costly breach with Firework. Download the Full … Read More

bank success story cybersecurity

Bank Success Story – Monitoring the criminal underground

Major Canadian Bank Chooses Flare Systems to Monitor the Criminal Underground Customer Success Story A large Canadian financial institution, who is Flare Systems’ customer and would prefer to remain anonymous, explains why they chose Firework to monitor the criminal underground … Read More

state of the cryptomarkets

Webinar Replay: State of the Cryptomarkets

Winners and Losers From the Shut Down of Empire Market David Hétu, Chief Research Office at Flare Systems investigated and presented the state of the cryptomarkets since one of the biggest illicit market shut down, Empire Market. Replay the webinar … Read More

empire market winners losers

The Winners and Losers of the Empire Market Shutdown

Exit Scam Model of Empire Market In this infographic, we present how the shutdown of the most-trafficked dark web marketplace occured, the aftermath for the malicious actors and what we should expect next from the underground net threats. The exit … Read More

hackers contracts

Hacker Contracts: The Economy Behind Illicit Markets

Hacker Contracts: The Economy Behind Illicit Markets Malicious actors often rely on each other to launch attacks. A carding ring that was recently dismantled by Russian authorities, for example, led to the arrest of 25 individuals who were working together.  … Read More

phishing attack example

Breaking up the Phishing Attack Chain

Breaking up the Phishing Attack Chain Phishing remains a popular attack method for malicious actors. This attack method is made possible by the wealth of services phishers can purchase on illicit markets: mass mailers, email lists, fake websites etc. Phishing … Read More