Dark Web Statistics to Illuminate Your Cybersecurity Approach
Happy Cybersecurity Awareness Month! The dark web can seem like a haunted house with mysteries in each corner. However, addressing facts and statistics about it can help you and your cybersecurity team prevent attacks. We’ve collected some spooky dark web statistics and facts to better inform your cybersecurity practices. 1. The Flare database has monitored […]
Top 5 Leaked Credentials Horror Stories
Leaked credentials can be both the cause and effect of data breaches. Regardless of the resources invested into cybersecurity, organizations are unfortunately not immune to cyberattacks. There have been a number of disastrous data breaches in this past year. We’ll highlight the top 5 leaked credentials horror stories of the past few months (in no […]
Spooky Ways to Ruin a Cybercriminal’s Day
It’s challenging to ruin a cybercriminal’s day because they only need one thing to work to gain access, while organizations must protect every potential attack surface. However, there are ways for everyone to contribute to a threat actor having a bad day. We’ll discuss some major areas that work to malicious actors’ advantages (which can […]
Threat Spotlight: Leaked Credentials and Geography
Executive Summary Leaked credentials are the cause of many cyberattacks, and the number of them on the dark web continues to grow rapidly: there are over 10 billion unique username password combinations once duplicates and combo lists have been removed. Flare has been monitoring and archiving the dark web for over 5 years, which has […]
Flare’s GitHub Monitoring Cut Incident Response Costs Significantly for a Large North American Bank
Overview According to a study with Stanford University Professor John Hancock and security firm Tessian, human error contributes to 88% of data breaches. Employee mistakes may seem harmless, but they can lead to leaked credentials, API keys, personally identifiable information, and intellectual property. This success story explains how Flare’s GitHub monitoring caught a previous employee […]
How to Apply Natural Language Processing to Cyber Threat Intelligence
The dark web is challenging to monitor. On top of it being structurally difficult to navigate, malicious actors have a unique vocabulary that is complex to understand for outsiders. Web scraping and web crawling enable extracting and indexing information on a larger scale. These tools need manually written rules to function. Since these processes require […]
Flare’s Infected Device Market Monitoring Prevented a Data Breach for an Investment Firm’s Portfolio Company
Overview Infected Devices are an increasingly common cause of data breaches. Threat actors install Redline/Raccoon malware through phishing emails or malicious ads, then sell access to the “fingerprint” of the browser on dark web markets with the potential to bypass MFA controls and access to all logins stored in the browser. Unlike stolen credentials, identifying […]
5 Hotspots for Threat Actor Activity
Where are malicious actors hiding on the web? Though it might seem like they’re mostly on the dark web, they can be hiding in plain sight on the clear web too. They can lurk on websites and messaging platforms you may use, like Telegram or Discord. By understanding how malicious actors can take advantage of […]
Flare’s Coming Soon to a Town Near You: Fall 2022 Events Edition
Come Say Hello! Flare will be touring Canada and the U.S. this fall. If you are attending any of these events, come say hi at our booth for: Can’t make it to any of these? Don’t worry! Schedule a demo and we can talk. BSides Charlotte – Saturday, September 24th, 2022 SINET NY – Thursday, […]
Spear Phishing Defense: A Complete 2022 Guide
Phishing emails are still one of the most widely used attack vectors. Threat actors create a convincing pretext in emails that dupes victims into revealing passwords, downloading malware, or unknowingly initiating fraudulent transactions. This pretext exploits human behavior and psychology. Many of today’s successful phishing campaigns are more sophisticated and targeted than traditional mass phishing […]