8 Passive OSINT Methods for Profiling Cybercriminals on the Dark Web

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "8 Passive OSINT Methods for Profiling Cybercriminals on the Dark Web" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Cybercrime is ever present in the increasingly digital landscape. Experts say that almost six ransomware attacks will occur every minute and back in November, 2021, our data science team reported a 280% increase in ransomware groups within the last year. But that’s only ransomware, cybercrime in general has also been increasing at a rapid pace, […]

What Is a Digital Footprint? A Flare View 

Digital footprints have often been seen in the context of the individual. However, at Flare, we view things in a slightly different light. As cloud adoption has risen and organizations have increasingly digitized information, the digital footprint of organizations has expanded dramatically. So let’s get the basics out of the way. What exactly is an […]

Automating External Risk Monitoring with a Digital Footprint Monitoring Solution

Information technology risk management frameworks help guide organizations to reduce the probability and impact of cyber incidents. Our previous article outlined how Digital Risk Protection (DRP) solutions fit in with these frameworks at a high level.   Both the NIST 800-39 and ISO 27005 frameworks include guidance on monitoring risks once they’ve been assessed, analyzed and […]

Preventing & Identifying Source Code Leaks: A Flare Guide

User-level software has become embedded in the day-to-day operations of most modern businesses. For cybercriminals, proprietary source code is a prime target that can be used to discover and exploit data vulnerabilities at the user level.  Extortion groups such as Lapsus$ have made it a mission to discover and release highly sensitive, proprietary source code […]

Trusting Your Inner Circle: Why Third Party Data Breaches are an Increasing Cyber Risk 

When an organization’s vendor or business partner’s network is compromised and sensitive data is exposed, third-party data breaches occur. Cybercriminals target these third parties within an organization’s ecosystem, and industry experts estimate that approximately 60% of all data breaches can be attributed to third parties. Credit card companies, email service providers, internet service providers, and […]

Cyber Risk: A Quick Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Cyber Risk: A Quick Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Digital transformation has given businesses more opportunities than ever before to connect with customers, sell their products, and communicate important offers or opportunities to build their brands. However, the increasing amount of information businesses have stored online has also given rise to malicious actors seeking to take advantage of vulnerabilities in user networks. Businesses that […]

How Digital Risk Protection Fits in with Risk Management Standards

How Digital Risk Protection Fits in with Risk Management Standards

Digital risk protection (DRP) solutions are known for their threat and issue-related alerting systems. As DRP solutions are increasingly becoming part of the standard Security Operations stack, teams are getting comfortable with receiving, triaging, and actioning the alerts arising from the dark, deep and clear web. These solutions, additionally, also help in the implementation of […]

Cyber Risk Remediation: A Comprehensive Approach

Cyber Risk Remediation

  Table of Contents What is Cyber Risk Remediation? Cyber risk remediation is the process of proactively identifying, addressing, and minimizing cyber threats that can adversely affect security and expose your organization, network, and customers to data breaches, ransomware attacks, and more. This article addresses the major causes of cyber threats within organizations and explains […]

A Quick Guide: How to Leverage Web Reconnaissance Tools

How to Leverage Web Reconnaissance Tools

What are Web Reconnaissance Tools? There are several tools out there that continuously scan the internet and make their findings available through a search engine. They can be described in different ways, such as IoT search engine, Search engine for service banners, Certificate search engine, Internet scanner, etc. We will refer to them here generically […]