Check out Threat Flow, the Security Industry’s First Transparent Generative AI Application

The Cybercrime Assembly Line

Light background with a graphic on the right side with three threat actors (one is rolling a large coin, the other is breaking into a computer, and another is interacting with login credentials. There is a dark yellow oval in the top left with the white text "Blog: and blue text below "The Cybercrime Assembly LIne."

Back in 2018, the Center for Strategic and International Studies came to the conclusion that cybercrime cost the world an approximate $600 billion annually, nearly 1% of global GDP. The cyber threat landscape has been constantly evolving, and the amount of money lost to cybercrime has only been increasing. According to IBM, the cost of […]

Illicit Telegram Groups: A New Dark Web Frontier?

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Illicit Telegram Groups: A New Dark Web Frontier?" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The shady underworld of the dark web provides cybercriminals with an outlet to trade stolen information, tools, or malware, hold victims of cyber attacks to ransom, and discuss their targets and tactics. But the dark web forums that normally host illicit marketplaces and discussions are starting to lose their allure. Find out why the messaging […]

Dig into the Dark Web with Flare: Play CTF

CTF The text Capture the Threats in orange over a dark blue background. There is a cartoon man with a Flare logo on his shirt holding a net.

Have you heard about Flare’s CTF: Capture the Threats? We created this game so players can further sharpen their skills in exploring the darker corners of the cyber world to stop malicious actors.  The game includes four categories: credential leaks, illicit markets (dark web and social media), open web (GitHub, paste, and buckets), and IP/domain, […]

Operational Threat Intelligence: The Definitive Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Attack Surface Monitoring: The Definitive 2022 Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Cyber threat intelligence involves gathering and analyzing an assortment of disparate data to help make prompt and effective security decisions related to current or potential attacks and adversaries. But simply lumping all of this information under a general label like “cyber threat intelligence” ignores the fact that there are different ways to categorize this data […]

Data Breach Prevention: Identifying Leaked Credentials on the Dark Web

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Data Breach Prevention: Identifying Credentials on the Dark Web." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat actors deploy many tactics, techniques and procedures (TTPs) to get access to sensitive data assets. Among this arsenal of weapons, obtaining correct user credentials (username and password pairs) that can be used for credential stuffing attacks plays a central role in most data breaches.  Poor password hygiene makes some credentials easy to guess. Social engineering […]

What Flare Has Been Cooking in 2022

The left side of the image has a yellow bubble that says "BLOG" with blue text underneath "What Flare Has Been Cooking in 2022." The right side has a graphic of a dark kitchen with a black board listing "What Flare Has Been Cooking in 2022."

We’ve been working on a lot this past year. Take a look at the spices, seasonings, and condiments in the kitchen to read about what we’ve been cooking up at Flare in 2022. Stay tuned to see what’s next for us in 2023! Click on each item on the board in the kitchen to read […]

The Threat Intelligence Lifecycle: A Definitive Guide for 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "The Threat Intelligence Lifecycle: A Definitive Guide for 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Building an effective threat intelligence program that disseminates actionable data that results in real-world risk reduction has never been more critical than in 2023. Threats to enterprise organizations ranging from geopolitical risk to sophisticated ransomware groups continue to proliferate while many security teams struggle to integrate dozens of tools together and stay on top of […]

Threat Intelligence in 2023: The Definitive Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Intelligence in 2023: The Definitive Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat Intelligence provides organizations with timely, relevant information about threats to their business. Threat intelligence can come in many different forms and includes four primary layers, strategic threat intelligence, tactical threat intelligence, operational threat intelligence, and technical threat intelligence. Organizations with mature threat intelligence functions in place are able to effectively collect intelligence from hundreds […]

Top 5 Most Asked Questions at BSides

Blue text in a white rectangle "Top 5 Most Asked Questions at BSides" over a blue background layered with a picture of presenters onstage at BSides Ottawa

This year, the Flare team had many opportunities to attend BSides conferences across Canada and the U.S. It was a special experience to join local BSides conferences as well as travel to cities and visit cybersecurity communities. BSides conferences mean a lot to us at Flare because hosting affordable, local events that foster a cybersecurity […]