Report – Stealer Logs, Single Sign On, and the New Era of Corporate Cybercrime

Stealer Logs, Single Sign On, and the New Era of Corporate Cybercrime

Introduction How many credentials do you have saved in your browser? How many form fills? How many credit cards? These may seem like innocuous questions, but the advent of infostealer malware makes them all too relevant. Infostealer variants such as RedLine, Raccoon, and Vidar infect computers and steal the browser fingerprint, which contains all of […]

Report – The Legal Cyberthreat Landscape

Ransomware attacks have increased by more than 100% across all industries from 2022 to 2023. The legal sector is especially at risk due to the sensitive nature of information that law firms hold.  Our research into how at-risk law firms are with two primary measures: Learn more about changes to legal risk over time and […]

Report – Stealer Logs & Corporate Access

Stealer Logs & Corporate Access

There’s been a surge of infostealer malware variants such as RedLine, Aurora, Raccoon, Vidar, and more, over the last few years. As described in the name, this type of malware steals information from the devices they infect. To better understand the threat of infostealer malware, we analyzed trends of 19.6 million stealer logs such as: […]

Video – Securing Patient Data: Challenges & Opportunities for Healthcare Cybersec in 2023

healthcare cybersecurity webinar

The healthcare sector is at the crossroads of digital advancement and rising cyber threats. With the highest breach costs over a decade (surpassing $10 million USD on average!), healthcare stands out as a prime target for cyber adversaries.  Ontario Health’s President & CEO Matthew Anderson and Flare’s CEO Norman Menz dissect how the healthcare sector […]

Video – Threat Intelligence & Geopolitical Risk in 2023

Threat Intelligence & Geopolitical Risk in 2023

Deep dive into geopolitics and threat intelligence as we navigate the cybersecurity currents of 2023. Former Director of Counterintelligence at the White House National Security Council Holden Triplett speaks about his past experiences in the field (including in FBI Counterintelligence) with Flare’s VP of Marketing Eric Clay. The highlights of Holden’s career learnings include:  Learn […]

Report – Dissecting the Dark Web Stealer Malware Lifecycle with the MITRE ATT&CK Framework

The right side of the image has a drawn raccoon with a black and red mysterious background. On the right is a dark navy background. At the top is a red oval with the text "Report" and below is white text "Dissecting the Dark Web Stealer Malware Lifecycle with the MITRE ATT&CK Framework." Below that is white text "Learn More" with a red arrow pointing down.

Stealer malware is a type of Remote Access Trojan (RAT) that infects computers, then extracts sensitive information, which threat actors then sell. The final malicious actor in the stealer malware supply chain can take advantage of the stealer logs to facilitate account takeover attacks, financial fraud, and ransomware.  Learn more about the stealer malware lifecycle:

Digital Risk Protection: The Complete Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Digital Risk Protection: The Complete Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Cybersecurity no longer stops at the network boundary. The past decade has seen the proliferation of online threats, many of which companies are entirely unaware of. Users’ credentials are sold on the dark web to facilitate account takeover schemes, sensitive customer data is leaked or traded for bitcoin, and companies regularly lose highly sensitive technical […]

Digital Risk Monitoring: A Quick Introduction

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "What is Digital Risk Monitoring?" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

It’s no secret that cyber threats are proliferating. In just the past 12 months, major ransomware attacks such as against Colonial Pipeline and against the U.S. meat industry have resulted in significant real-world impacts. At the same time major software providers such as Solarwinds have been the victim of large scale compromises. To counter the […]

What Is Domain Monitoring?

what is domain monitoring

Have you ever received an email from a colleague but in your gut felt that something was off? The spelling or grammar in the body of the message may have looked off, or the signature line different from past emails. Your spam filter may have even caught the email and flagged it as a potential […]

Dark Web vs Deep Web: What’s the Difference?

Deep vs Dark web

Like billions of others, you probably use the Internet to find answers, buy consumer goods, communicate with others, enjoy leisure activities, and meet your professional responsibilities. But how much do you really know about this vast, modern-day version of the Library of Alexandria? For example, are you aware that the Internet you use is the […]