Check out Threat Flow, the Security Industry’s First Transparent Generative AI Application

Cyber Risk Remediation: A Comprehensive Approach

Cyber Risk Remediation

  Table of Contents What is Cyber Risk Remediation? Cyber risk remediation is the process of proactively identifying, addressing, and minimizing cyber threats that can adversely affect security and expose your organization, network, and customers to data breaches, ransomware attacks, and more. This article addresses the major causes of cyber threats within organizations and explains […]

A Quick Guide: How to Leverage Web Reconnaissance Tools

How to Leverage Web Reconnaissance Tools

What are Web Reconnaissance Tools? There are several tools out there that continuously scan the internet and make their findings available through a search engine. They can be described in different ways, such as IoT search engine, Search engine for service banners, Certificate search engine, Internet scanner, etc. We will refer to them here generically […]

Continuous Monitoring of Web Reconnaissance Platform

Continous Monitoring of Web Recon

Using web reconnaissance platforms to monitor your attack surface or run investigations can be time-consuming, especially when we’re looking to understand what happened at a point in time in the past. These platforms do sometimes provide a view on all the past collected data included in a paid subscription, but navigating and interpreting the information […]

Why Clustering Malicious Actors Using AI Can Help with Organizational Cyber Risk – Part One

Clustering Malicious Actors Using AI - Part 1

In today’s digital world, malicious actors have access to a multitude of ways to preserve and increase their anonymity online. We recently posted an article highlighting various Open-Source Intelligence (OSINT) methods to profile cybercriminals on the darkweb, and you could consider this a follow-up and in-depth dive into the Artificial Intelligence (AI) based technologies we […]

Quick Report: Credit Cards Sold on the Dark Web in 2021

Credit Cards Sold on the Dark Web in 2021

The dark web is home to a vast amount of illicit markets and shops. Although there’s a variety of goods to be purchased on the dark web, one of the most sold resources by volume on the dark web, if not the most sold commodity, is stolen credit cards. Just last week, the largest carding […]

Your Data Has Been Leaked: Do Users Care About Data Leaks?

Do Users Care About Data Leaks?

Data leaks and data breaches can come from anywhere. Data leaks can occur when an employee mistakenly leaves an API key on Github, or when a third party gives the public access to your proprietary information due to a permissions issue, or when a user clicks on a phishing link and gives their personal information […]

Flare’s Insights on Major Cyber Trends From 2021

flare cyber trends 2021

2020 and 2021 have seen dramatic changes in the way we do business and in turn, the way we protect those businesses and people. Cybersecurity is a fast changing industry where some trends stay, while others simmer out. However, let’s discuss three topics that have been trends or major events for 2021 and will surely […]

What is Data Leakage? How Do You Prevent It?

What is Data Leakage

During 2020, on average every person created at least 1.7 MBs of data per second and around 44 zettabytes of data in terms of the complete digital world. Today, the amount of data we create, distribute, analyze and sell has been increasing at an incredibly fast rate. Due to this increase of potentially sensitive data, […]