8 Passive OSINT Methods for Profiling Cybercriminals on the Dark Web
Cybercrime is ever present in the increasingly digital landscape. Experts say that almost six ransomware attacks will occur every minute and back in November, 2021, our data science team reported a 280% increase in ransomware groups within the last year. But that’s only ransomware, cybercrime in general has also been increasing at a rapid pace, […]
What Is a Digital Footprint? A Flare View
Digital footprints have often been seen in the context of the individual. However, at Flare, we view things in a slightly different light. As cloud adoption has risen and organizations have increasingly digitized information, the digital footprint of organizations has expanded dramatically. So let’s get the basics out of the way. What exactly is an […]
Automating External Risk Monitoring with a Digital Footprint Monitoring Solution
Information technology risk management frameworks help guide organizations to reduce the probability and impact of cyber incidents. Our previous article outlined how Digital Risk Protection (DRP) solutions fit in with these frameworks at a high level. Both the NIST 800-39 and ISO 27005 frameworks include guidance on monitoring risks once they’ve been assessed, analyzed and […]
Preventing & Identifying Source Code Leaks: A Flare Guide
User-level software has become embedded in the day-to-day operations of most modern businesses. For cybercriminals, proprietary source code is a prime target that can be used to discover and exploit data vulnerabilities at the user level. Extortion groups such as Lapsus$ have made it a mission to discover and release highly sensitive, proprietary source code […]
Trusting Your Inner Circle: Why Third Party Data Breaches are an Increasing Cyber Risk
When an organization’s vendor or business partner’s network is compromised and sensitive data is exposed, third-party data breaches occur. Cybercriminals target these third parties within an organization’s ecosystem, and industry experts estimate that approximately 60% of all data breaches can be attributed to third parties. Credit card companies, email service providers, internet service providers, and […]
Cyber Risk: A Quick Guide
Digital transformation has given businesses more opportunities than ever before to connect with customers, sell their products, and communicate important offers or opportunities to build their brands. However, the increasing amount of information businesses have stored online has also given rise to malicious actors seeking to take advantage of vulnerabilities in user networks. Businesses that […]
How Digital Risk Protection Fits in with Risk Management Standards
Digital risk protection (DRP) solutions are known for their threat and issue-related alerting systems. As DRP solutions are increasingly becoming part of the standard Security Operations stack, teams are getting comfortable with receiving, triaging, and actioning the alerts arising from the dark, deep and clear web. These solutions, additionally, also help in the implementation of […]
Cyber Risk Remediation: A Comprehensive Approach
Table of Contents What is Cyber Risk Remediation? Cyber risk remediation is the process of proactively identifying, addressing, and minimizing cyber threats that can adversely affect security and expose your organization, network, and customers to data breaches, ransomware attacks, and more. This article addresses the major causes of cyber threats within organizations and explains […]
A Quick Guide: How to Leverage Web Reconnaissance Tools
What are Web Reconnaissance Tools? There are several tools out there that continuously scan the internet and make their findings available through a search engine. They can be described in different ways, such as IoT search engine, Search engine for service banners, Certificate search engine, Internet scanner, etc. We will refer to them here generically […]
The Result of Clustering Malicious Actors Through Artificial Intelligence – Part Three
Welcome to the final installment of this three-part blog series, where we will go over the results presented in Flare of our new Similar Actor Model. As a reminder, in part one, we discussed why we believe that using artificial intelligence for clustering malicious actors could help organizations in monitoring the dark web more effectively, […]