Preventing Credential Theft: 3 Critical Steps
Stolen credentials provide cybercriminals with both an entry point into your network and a way to move through your network undetected. While the cyber threat landscape is more diverse in terms of tactics and techniques than ever, the aftermath of many data breach and ransomware incidents ends up tracing either their origin or their escalation […]
Attack Surface Monitoring: The Definitive 2022 Guide
Widespread digital transformation initiatives over the last decade mean that most IT environments are more complex and heterogeneous than ever. Cloud computing, virtual machines on multiple operating systems, and remote work arrangements are cornerstone infrastructural elements that blur the boundary between the internal network and external Internet at most organizations. From a cybersecurity perspective, dissolved […]
Attack Surface Reduction: 5 Steps to Reduce Cyber Risk
There are many contributing factors that make it difficult to deal with today’s cyber threat landscape. Complex infrastructure, sophisticated threats, cybersecurity talent shortages—these things all matter. Arguably a more important factor, however, is that businesses fail to view security from threat actors’ perspectives and neglect to manage their attack surface. This article takes a deep […]
8 Passive OSINT Methods for Profiling Cybercriminals on the Dark Web
Cybercrime is ever present in the increasingly digital landscape. Experts say that almost six ransomware attacks will occur every minute and back in November, 2021, our data science team reported a 280% increase in ransomware groups within the last year. But that’s only ransomware, cybercrime in general has also been increasing at a rapid pace, […]
What Is a Digital Footprint? A Flare View
Digital footprints have often been seen in the context of the individual. However, at Flare, we view things in a slightly different light. As cloud adoption has risen and organizations have increasingly digitized information, the digital footprint of organizations has expanded dramatically. So let’s get the basics out of the way. What exactly is an […]
Automating External Risk Monitoring with a Digital Footprint Monitoring Solution
Information technology risk management frameworks help guide organizations to reduce the probability and impact of cyber incidents. Our previous article outlined how Digital Risk Protection (DRP) solutions fit in with these frameworks at a high level. Both the NIST 800-39 and ISO 27005 frameworks include guidance on monitoring risks once they’ve been assessed, analyzed and […]
Preventing & Identifying Source Code Leaks: A Flare Guide
User-level software has become embedded in the day-to-day operations of most modern businesses. For cybercriminals, proprietary source code is a prime target that can be used to discover and exploit data vulnerabilities at the user level. Extortion groups such as Lapsus$ have made it a mission to discover and release highly sensitive, proprietary source code […]
Trusting Your Inner Circle: Why Third Party Data Breaches are an Increasing Cyber Risk
When an organization’s vendor or business partner’s network is compromised and sensitive data is exposed, third-party data breaches occur. Cybercriminals target these third parties within an organization’s ecosystem, and industry experts estimate that approximately 60% of all data breaches can be attributed to third parties. Credit card companies, email service providers, internet service providers, and […]
Cyber Risk: A Quick Guide
Digital transformation has given businesses more opportunities than ever before to connect with customers, sell their products, and communicate important offers or opportunities to build their brands. However, the increasing amount of information businesses have stored online has also given rise to malicious actors seeking to take advantage of vulnerabilities in user networks. Businesses that […]
How Digital Risk Protection Fits in with Risk Management Standards
Digital risk protection (DRP) solutions are known for their threat and issue-related alerting systems. As DRP solutions are increasingly becoming part of the standard Security Operations stack, teams are getting comfortable with receiving, triaging, and actioning the alerts arising from the dark, deep and clear web. These solutions, additionally, also help in the implementation of […]