Flare Partners with Distology for Strengthened Security Intelligence and Threat Exposure Management in Europe

Dark navy background with Flare logo at the top middle. There is a Distology logo in the middle of the right half of the graphic. The left side of the graphic has a blue oval with "Blog" inside. Below it is white copy "Flare Partners with Distology for Strengthened Security Intelligence and Threat Exposure Management in Europe" There is an oval below it outlined in purple with the white text "LEARN MORE" with a white arrow pointing down next to it.

Today, we’re announcing a new partnership with Distology, a leading specialist distributor of cybersecurity solutions.  Distology has a shared vision for channel-first cybersecurity with us, so we’re excited to reach more security providers across Europe. With Distology’s extensive partner ecosystem, more organizations can offer dark web intelligence in addition to their current capabilities. This includes […]

Deciphering Black Basta’s Infrastructure from the Chat Leak

This article has originally appeared on Cybercrime Diaries On February 20, 2025, the cybersecurity community received an unexpected stroke of luck as internal strife seemingly spread within the infamous Black Basta ransomware group. On that day, an unknown individual using the alias ExploitWhispers released a file on Telegram, allegedly containing the group’s internal chat logs. […]

The Underground’s Favorite Messenger: Telegram’s Reign Continues

The data and visualizations presented on this webpage are based on information collected from January 2024 to January 2025. These graphs are static and do not reflect real-time updates or recent developments. Any trends, insights, or conclusions should be interpreted with this timeframe in mind. Executive Summary Telegram remains the dominant messaging platform in the […]

5 Questions On OPSEC Fundamentals

Surveillance is everywhere and ingrained in our society. While privacy is a human right, we live in an era of Operational Security (OPSEC) and privacy fatigue. The technologies we use everyday collect more and more information, making many people feel hopeless about having control over their information. From painful opt-out processes to the integration of […]

Flare Academy is Here!

Dark blue background with thin wavy lines. One the right is the Flare Academy logo. Title in white text is "Flare Academy is Here!" Above the title is a blue oval that says "Blog" inside. In the top middle is the white Flare logo. is a white oval with "Press Release" inside. At the bottom left of the page is white text "Learn More" with an arrow pointing down.

We’re excited to share that we now offer Flare Academy, an educational hub with free interactive online training for cybersecurity professionals.  What is Flare Academy? Training Flare Academy offers online training modules led by subject matter experts on the latest cybersecurity threats to cybersecurity practitioners interested in progressing their education.  These sessions cover various pressing […]

MOVEit Repackaged and Recycled

The largest repackage and re-post of an old leak In November 2024, a hacker known as “Nam3L3ss” allegedly released previously undisclosed data from the MOVEit breach in May 2023. This leak consisted of millions of records, including sensitive employee and big brand corporate information, significantly escalating the breach’s impact. Digging into this story reveals that […]

Arrests, RedLine & META Infrastructure Takedown, and MOVEit Leaks

The cybercrime ecosystem has had a lot happening in the past few weeks, as always. We’ve got you covered.  Dive into the most pressing recent stories on data leaks, cybercrime, and the dark web with security researcher Nick Ascoli on the podcast Leaky Weekly. On this episode of Leaky Weekly, Nick covers: Tune in for […]

Infostealer Malware: An Introduction

Infostealer malware represents one of the most underrated threats to corporate and consumer information security today. These sophisticated remote access Trojans (RATs) silently infect computers and systematically exfiltrate massive amounts of sensitive information from the host to threat actors’ command and control (C2) infrastructure. Their primary targets include: Once the information has been exfiltrated, it […]