Infostealer Malware: An Introduction
Infostealer malware represents one of the most underrated threats to corporate and consumer information security today. These sophisticated remote access Trojans (RATs) silently infect computers and systematically exfiltrate massive amounts of sensitive information from the host to threat actors’ command and control (C2) infrastructure. Their primary targets include: Once the information has been exfiltrated, it […]
6 Things to Know About Improving Threat Intelligence Collection
Flare recently hosted our first Threat Intel Workshop with Senior Threat Intelligence Researcher Tammy Harper. Below are some of the questions Tammy covered in improving threat intelligence collection practices. 1. How does the disruption to Telegram affect threat actors? After the arrest of Telegram CEO in August 2024, the messaging platform that has been popular […]
Dark Web Forum Arrests, Columbus Ransomware Attack Updates, and American Background Info Data Leak
Keeping up with the world of cybercrime is important but can often feel overwhelming for security practitioners. Leaky Weekly is a podcast hosted by security researcher Nick Ascoli as he dives into the most pressing stories on data leaks, cybercrime, and the dark web in the last week or so. On this episode of Leaky […]
Flare and GDPR Compliance: A Quick Guide
At Flare, we take all forms of security seriously, including the protection of your personal data. This includes compliance with the General Data Protection Regulation (GDPR) when processing personal data on behalf of our customers. To learn more, take a look at our Legal Center, specifically the Privacy Policy and Data Processing Addendums. For 16 […]
Cybercrime Current Events: AWS Takeover Campaign, Ransomware Attack on Columbus, and City of Columbus Sues Ransomware Researcher Whistleblower
There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the most pressing stories on data leaks, cybercrime, and the dark web in the last week or so. On this episode of Leaky Weekly, […]
Cybercrime Current Events: Background Check Organization Breach, a Repossessed Ransomware Blog, Feuding Forums, and Double Arrest of “J.P. Morgan”
There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the most pressing stories on data leaks, cybercrime, and the dark web in the last week or so. On this episode of Leaky Weekly, […]
Launching Leaky Weekly with Flare, Cybercrime Current Events Podcast
There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the most pressing stories on data leaks, cybercrime, and the dark web in the last week or so. Tune in for current events every […]
Let’s Meet at Hacker Week in Las Vegas!
The Flare team will be in Vegas this week for Hacker Week! If you are attending BSides Las Vegas or DEFCON, come meet our team either at the Flare booth or around the venue. There’s a chance to win a free bottle of scotch! BSides Vegas Booth #9, August 6-7 Come by our booth for […]
ShapeUp at Flare: A Game-Changer for Project Management
By Benoit Doyon, Software Development Team Lead I first encountered ShapeUp during one of my initial interviews for a position at Flare. My soon-to-be manager mentioned, “We’re using a methodology that works well for us, but you might not have heard of it before.” With over 10 years of software development experience under my belt, […]
Red Teaming the Modern Attack Landscape
In today’s expanded attack surface, new technologies create new opportunities for businesses and malicious actors. Attackers can use the same artificial intelligence (AI) and large language models (LLMs) that companies use, often in the same way. In both cases, these technologies reduce the time spent on repetitive, manual tasks. For example, organizations may use LLMs, […]