Preventing Credential Theft: 3 Critical Steps

Preventing Credential Theft: 3 Critical Steps

Stolen credentials provide cybercriminals with both an entry point into your network and a way to move through your network undetected. While the cyber threat landscape is more diverse in terms of tactics and techniques than ever, the aftermath of many data breach and ransomware incidents ends up tracing either their origin or their escalation […]

Attack Surface Monitoring: The Definitive 2022 Guide

Widespread digital transformation initiatives over the last decade mean that most IT environments are more complex and heterogeneous than ever. Cloud computing, virtual machines on multiple operating systems, and remote work arrangements are cornerstone infrastructural elements that blur the boundary between the internal network and external Internet at most organizations. From a cybersecurity perspective, dissolved […]

Attack Surface Reduction: 5 Steps to Reduce Cyber Risk

There are many contributing factors that make it difficult to deal with today’s cyber threat landscape. Complex infrastructure, sophisticated threats, cybersecurity talent shortages—these things all matter. Arguably a more important factor, however, is that businesses fail to view security from threat actors’ perspectives and neglect to manage their attack surface. This article takes a deep […]

Ransomware Defense: How External Monitoring Can Enable Intelligent Security

It wasn’t always the case that ransomware attacks resulted in data breaches—traditionally, ransomware strains just blocked access to files or systems unless you paid up. The first double extortion attack in late 2019 signaled a shift in ransomware gangs’ tactics. Recognizing that information is an incredibly valuable asset, threat actors began exfiltrating sensitive data assets […]

How to Choose a Digital Footprint Solution

How to choose a digital footprint monitoring solution An organization’s digital footprint includes any publicly available information about them, whether it’s credentials, exposed services, intellectual property, or any other kind of data. Although monitoring your digital footprint is key to understanding what malicious actors see when they plan a targeted or untargeted attack, choosing a […]

Dark Web Monitoring: A Quick Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Dark Web Monitoring: A Quick Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Organizations are concerned about the proliferation of threats on the dark web. Even as cybersecurity budgets have increased dramatically over the past decade, ransomware, phishing and other cyber threats have grown in intensity and frequency. For example, Flare’s Research team identified a surge in ransomware attacks from 2020 to 2021 – a total increase of […]