Cybercrime group on a data leakage tear through U.S. States

Data Leaks Escalate As Data Leaks continue to mount online this year, dealing massive impacts to the companies and governments they are stolen from, hackers have become increasingly public about their activities and continue to act with impunity in the cybercrime underworld. After being down for a brief period after the arrest of its administrator, […]

What is Your Security Attack Surface?

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "What is Your Security Attack Surface?" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

As businesses and individuals become more reliant on technology, they inadvertently increase their security attack surface – the sum total of all the vulnerabilities that threat actors can exploit.  Understanding your security attack surface is essential for developing an effective cybersecurity strategy. By gaining insights into your security attack surface, you can proactively safeguard your […]

Threat Intelligence & The Cyber Kill Chain: The Complete Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Intelligence & The Cyber Kill Chain: The Complete Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Every day that you prevent an attack is a good day. Sophisticated adversaries have the money, skills, and technologies to thwart most organizations’ defensive capabilities. With the rise of Ransomware-as-a-Service (RaaS), less sophisticated attackers have access to payloads and customer service representatives to help them deploy successful attacks. By understanding attackers’ motivations and goals, you […]

Network Attack Surface: A Quick Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Network Attack Surface: A Quick Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Understanding and securing the network attack surface has become a critical priority for businesses seeking to protect their valuable data and systems. By comprehending the network attack surface and its significance, organizations can proactively implement security measures and minimize the risk of successful attacks.  Understanding Network Attack Surface: What It Encompasses and Why It Matters […]

Challenges to Healthcare Cybersecurity

Black text that says "Challenges to Healthcare Cybersecurity" underneath a blue rectangle that has "BLOG" in white text in it. To the right is a cartoon graphic of a laptop computer with the medical cross symbol on the screen. To the left of the laptop graphic are medical paraphernalia including a stethoscope, pills, bandage, and bottles.

Executive Overview The average cost of a data breach in healthcare in Canada is about 5.5 million CAD. Since delivering patient care depends on cybersecurity, securing healthcare systems and patient data is absolutely crucial.  Various factors influence risks to healthcare cybersecurity, including current geopolitical events. The U.S. Department of Health and Human Services issued a […]

Threat Spotlight: Incident Response & Cybercrime in 2023

A navy background with the white text "Incident Response & Cybercrime in 2023."

Executive Summary As the threat environment rapidly changes (and threat actors’ tactics along with it), what should cyber practitioners be on the lookout for?  Former Federal Bureau of Investigation (FBI) Deputy Director Andrew McCabe & former United States Postal Services (USPS) CISO Gregory Crabb spoke with Flare CEO Norman Menz and Director of Marketing Eric […]

Cyber Threat Detection: The Definitive Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Cyber Threat Detection: The Definitive Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

In today’s interconnected world, cyber threats continue to rise, while traditional cybersecurity techniques are becoming less effective and costlier. Coupled with the challenges of hiring skilled cyber professionals, it is evident that cybersecurity needs to change.  To reduce cyber threats for organizations and individuals, it is crucial to understand the different types of cyber threats […]

Domain Takedown: Removing Spear Phishing Domains for Free

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Domain Takedown: Removing Spear Phishing Domains for Free." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

In today’s digital-driven landscape, cyber threats lurk around every corner, with spear phishing attacks posing a particularly daunting challenge. As threat actors innovate, it’s crucial that organizations stay one step ahead.  One increasingly effective tactic is domain takedown – a process designed to remove malicious spear phishing domains from the web, thereby mitigating the risk […]

7 Free Tools to Monitor Your Attack Surface

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "7 Free Tools to Monitor Your Attack Surface." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

In the realm of cybersecurity, the term “attack surface” refers to the sum total of potential entry points or vulnerabilities that a malicious actor might exploit to infiltrate an organization’s digital infrastructure. These vulnerabilities could exist in hardware, software, network services, or even the human element, like unsuspecting employees falling prey to phishing scams. The […]

Dark Web Investigations: Best Practices

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Dark Web Investigations: 5 Best Practices." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

As we become increasingly reliant on digital platforms, the dark web plays a critical role in the ever-evolving landscape of cyber threat intelligence. For organizations, comprehending and mitigating these hidden dangers has become a business imperative.  The increase in remote work and cloud-based solutions, also amplifies cyber risks. By actively conducting dark web investigations, organizations […]