Check out Threat Flow, the Security Industry’s First Transparent Generative AI Application

Dark Web Statistics to Illuminate Your Cybersecurity Approach

dark web statistics

Happy Cybersecurity Awareness Month! The dark web can seem like a haunted house with mysteries in each corner. However, addressing facts and statistics about it can help you and your cybersecurity team prevent attacks. We’ve collected some spooky dark web statistics and facts to better inform your cybersecurity practices.  1. The Flare database has monitored […]

Top 5 Leaked Credentials Horror Stories

top 5 leaked credentials horror stories

Leaked credentials can be both the cause and effect of data breaches. Regardless of the resources invested into cybersecurity, organizations are unfortunately not immune to cyberattacks.  There have been a number of disastrous data breaches in this past year. We’ll highlight the top 5 leaked credentials horror stories of the past few months (in no […]

Spooky Ways to Ruin a Cybercriminal’s Day

Spooky Ways to Ruin a Cybercriminal's Day

It’s challenging to ruin a cybercriminal’s day because they only need one thing to work to gain access, while organizations must protect every potential attack surface. However, there are ways for everyone to contribute to a threat actor having a bad day.  We’ll discuss some major areas that work to malicious actors’ advantages (which can […]

Threat Spotlight: Leaked Credentials and Geography

A navy background with the white text "Leaked Credentials & Geography"

Executive Summary Leaked credentials are the cause of many cyberattacks, and the number of them on the dark web continues to grow rapidly: there are over 10 billion unique username password combinations once duplicates and combo lists have been removed.  Flare has been monitoring and archiving the dark web for over 5 years, which has […]

Flare’s GitHub Monitoring Cut Incident Response Costs Significantly for a Large North American Bank

Gradient blue and lighter turquoise background. There is a green bubble in the top left that says "Success Story." White text below it says "Large North American Bank Streamlines Sensitive Data Leaks Monitoring; Significantly Cutting Incident Response Costs"

Overview According to a study with Stanford University Professor John Hancock and security firm Tessian, human error contributes to 88% of data breaches. Employee mistakes may seem harmless, but they can lead to leaked credentials, API keys, personally identifiable information, and intellectual property.  This success story explains how Flare’s GitHub monitoring caught a previous employee […]

How to Apply Natural Language Processing to Cyber Threat Intelligence

Gradient light blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's darker blue text: "How to Apply Natural Language Processing to Cyber Threat Intelligence." There is blue text below it that says"With Flare AI Team Francois Masson & Olivier Michaud"

The dark web is challenging to monitor. On top of it being structurally difficult to navigate, malicious actors have a unique vocabulary that is complex to understand for outsiders.  Web scraping and web crawling enable extracting and indexing information on a larger scale. These tools need manually written rules to function. Since these processes require […]

5 Hotspots for Threat Actor Activity

5 Hotspots for Threat Actor Activity

Where are malicious actors hiding on the web? Though it might seem like they’re mostly on the dark web, they can be hiding in plain sight on the clear web too. They can lurk on websites and messaging platforms you may use, like Telegram or Discord. By understanding how malicious actors can take advantage of […]

Flare’s Coming Soon to a Town Near You: Fall 2022 Events Edition

flare cybersecurity events 2022

Come Say Hello! Flare will be touring Canada and the U.S. this fall. If you are attending any of these events, come say hi at our booth for: Can’t make it to any of these? Don’t worry! Schedule a demo and we can talk. BSides Charlotte – Saturday, September 24th, 2022 SINET NY – Thursday, […]

Spear Phishing Defense: A Complete 2022 Guide

Phishing emails are still one of the most widely used attack vectors. Threat actors create a convincing pretext in emails that dupes victims into revealing passwords, downloading malware, or unknowingly initiating fraudulent transactions. This pretext exploits human behavior and psychology.  Many of today’s successful phishing campaigns are more sophisticated and targeted than traditional mass phishing […]