Check out Threat Flow, the Security Industry’s First Transparent Generative AI Application

What Is an Attack Surface and How do you Reduce it?

What is an Attack Surface

What Is An Attack Surface? An attack surface is the total number of all possible attack vectors (or points) where an attacker or unauthorized user can access a system and enter or extract data.  Attack surfaces can be split into two different categories. 1. Physical Attack Surface A physical attack surface area for an organization […]

Digital Risk Monitoring: A Quick Introduction

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "What is Digital Risk Monitoring?" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

It’s no secret that cyber threats are proliferating. In just the past 12 months, major ransomware attacks such as against Colonial Pipeline and against the U.S. meat industry have resulted in significant real-world impacts. At the same time major software providers such as Solarwinds have been the victim of large scale compromises. To counter the […]

White House Market Is Officially Retiring

White House Market Is Officially Retiring

Updated: November 26th, 2021 As the article below is a bit out of date, here’s a breakdown of most of the large changes in the dark web marketplace scene: Empire Market exit scammed in August 2020 DarkMarket was sized in January 2021 Yellow Brick exited a few days after DarkMarket BigBlue was seized by Interpol in April […]

What Is Domain Monitoring?

what is domain monitoring

Have you ever received an email from a colleague but in your gut felt that something was off? The spelling or grammar in the body of the message may have looked off, or the signature line different from past emails. Your spam filter may have even caught the email and flagged it as a potential […]

Dark Web vs Deep Web: What’s the Difference?

Deep vs Dark web

Like billions of others, you probably use the Internet to find answers, buy consumer goods, communicate with others, enjoy leisure activities, and meet your professional responsibilities. But how much do you really know about this vast, modern-day version of the Library of Alexandria? For example, are you aware that the Internet you use is the […]

Dark Web Threat Intelligence: A Quick Guide

dark web threat intelligence

Building cyber threat intelligence capabilities has never been more important than in 2021. Attacks against businesses of all sizes are increasing rapidly. At the same time, the criminal underground is larger and more differentiated than ever. A single cyberattack against a business might involve dozens of threat actors each performing highly specialized roles. Gaining visibility […]

Information Leakage: What you need to Know

Information leakage poses a serious problem for thousands of companies around the world. Many software startups and even large, established enterprise organizations have difficulty ensuring that technical data is kept under lock and key. Problems proliferate with secrets being improperly committed on GitHub repositories and Amazon S3 buckets with poorly improperly configured permissions leaving sensitive […]

Dark Web Monitoring: A Quick Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Dark Web Monitoring: A Quick Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Organizations are concerned about the proliferation of threats on the dark web. Even as cybersecurity budgets have increased dramatically over the past decade, ransomware, phishing and other cyber threats have grown in intensity and frequency. For example, Flare’s Research team identified a surge in ransomware attacks from 2020 to 2021 – a total increase of […]

Digital Risk Protection (DRP) Glossary

DRP glossary

We are aware of the information overload and wealth of technical terms that may sometimes be confusing. To make it easier to understand industry terminology, we came up with some definitions of some of the most popular cybersecurity concepts. DRP In its 2020 report titled “Emerging Technologies: Critical Insights in Digital Risk Protection Services,” Gartner […]

Firework integration with Azure Sentinel: Leveraging new SOAR capabilities

Firework Azure Sentinel

For any modern cybersecurity team, gathering system logs in a centralized location is insufficient and only one step in the process. In order to keep up with the pace of incoming information, automation is crucial. Microsoft Azure is recognizing this with Sentinel’s recent development in offering a platform that not only aggregates and ingests logs […]