Cyber Risk Remediation: A Comprehensive Approach
Table of Contents What is Cyber Risk Remediation? Cyber risk remediation is the process of proactively identifying, addressing, and minimizing cyber threats that can adversely affect security and expose your organization, network, and customers to data breaches, ransomware attacks, and more. This article addresses the major causes of cyber threats within organizations and explains […]
A Quick Guide: How to Leverage Web Reconnaissance Tools
What are Web Reconnaissance Tools? There are several tools out there that continuously scan the internet and make their findings available through a search engine. They can be described in different ways, such as IoT search engine, Search engine for service banners, Certificate search engine, Internet scanner, etc. We will refer to them here generically […]
The Result of Clustering Malicious Actors Through Artificial Intelligence – Part Three
Welcome to the final installment of this three-part blog series, where we will go over the results presented in Flare of our new Similar Actor Model. As a reminder, in part one, we discussed why we believe that using artificial intelligence for clustering malicious actors could help organizations in monitoring the dark web more effectively, […]
How Artificial Intelligence Can Help With Clustering Malicious Actors And Decrease Organizational Cyber Risk – Part two
Welcome to part two of our three-part blog series. In part one we discussed why we believe that using artificial intelligence for clustering malicious actors could help organizations in monitoring the dark web more effectively. In the second installment of this Artificial Intelligence (AI) series, we will delve deeper into Natural Language Processing (NLP), a […]
Continuous Monitoring of Web Reconnaissance Platform
Using web reconnaissance platforms to monitor your attack surface or run investigations can be time-consuming, especially when we’re looking to understand what happened at a point in time in the past. These platforms do sometimes provide a view on all the past collected data included in a paid subscription, but navigating and interpreting the information […]
Why Clustering Malicious Actors Using AI Can Help with Organizational Cyber Risk – Part One
In today’s digital world, malicious actors have access to a multitude of ways to preserve and increase their anonymity online. We recently posted an article highlighting various Open-Source Intelligence (OSINT) methods to profile cybercriminals on the darkweb, and you could consider this a follow-up and in-depth dive into the Artificial Intelligence (AI) based technologies we […]
Quick Report: Credit Cards Sold on the Dark Web in 2021
The dark web is home to a vast amount of illicit markets and shops. Although there’s a variety of goods to be purchased on the dark web, one of the most sold resources by volume on the dark web, if not the most sold commodity, is stolen credit cards. Just last week, the largest carding […]
Your Data Has Been Leaked: Do Users Care About Data Leaks?
Data leaks and data breaches can come from anywhere. Data leaks can occur when an employee mistakenly leaves an API key on Github, or when a third party gives the public access to your proprietary information due to a permissions issue, or when a user clicks on a phishing link and gives their personal information […]
Flare’s Insights on Major Cyber Trends From 2021
2020 and 2021 have seen dramatic changes in the way we do business and in turn, the way we protect those businesses and people. Cybersecurity is a fast changing industry where some trends stay, while others simmer out. However, let’s discuss three topics that have been trends or major events for 2021 and will surely […]
What is Data Leakage? How Do You Prevent It?
During 2020, on average every person created at least 1.7 MBs of data per second and around 44 zettabytes of data in terms of the complete digital world. Today, the amount of data we create, distribute, analyze and sell has been increasing at an incredibly fast rate. Due to this increase of potentially sensitive data, […]