Threat Spotlight: 12 Days of Threats
Executive Summary 1. Russian Market (Infected Devices & the Growing Threat of Stealer Malware) Infected device markets sell access to infected computers and browser fingerprints that can be used by threat actors to compromise online accounts. Like identity theft, the infected device can reveal a wealth of personal information about the victim, like where they […]
OSINT in Cybersecurity: Effectively Leveraging Open-Source Intelligence to Drive Enterprise Security Value in 2023
OSINT is a critical aspect of a competent cybersecurity program. Once an organization has the basics in place such as EDR, multi-factor authentication, network monitoring, and robust firewall rules, conducting effective open-source intelligence represents a significant opportunity for organizations to improve their cyber readiness. Cybersecurity OSINT enables companies to: What is Open Source Intelligence (OSINT)? […]
Attack Surface Monitoring: The Definitive 2023 Guide
Today’s threat actors constantly probe your IT ecosystem for ways to gain unauthorized access and achieve their goals. Thinking like an attacker to figure out the paths of least resistance into your environment is imperative in protecting your digital assets and thwarting attacks. These paths together make up your attack surface—the complete set of entry […]
Our CTF is Currently Closed – Please Check Back Later
Our CTF: Capture the Threats is currently closed. Please check here or follow our social media for for further updates: • LinkedIn • Twitter • Facebook We’ve launched CTF: Capture the Threats so you can upgrade your threat hunting skills while having fun. The game includes four categories of 12 challenges to stop a threat […]
Social Network of Information: How Threat Actors Take Advantage of Social Media
Social media platforms serve many important functions like connecting long distance family members, reconnecting old friends, finding jobs, and more. However, as they store and encourage sharing personal information such as birthdays, locations, and hobbies, the wrong person putting these pieces together can lead to harmful repercussions. Social media companies hold millions of peoples’ personal […]
Threat Spotlight: Dark Web Data Breaches
Executive Summary There are 10 billion stolen credentials on the dark web. They continue to be one of the top means of compromise for cyberattacks and could lead to disastrous data breaches for individuals and organizations. Flare’s Co-Founder and Chief Product Officer Yohan Trépanier Montpetit and Director of Marketing Eric Clay talk through the findings […]
Building Your Threat Hunting Framework: Key Considerations
Threat hunting shifts security operations from reactive to proactive by searching for signs of attacker tactics, techniques, and procedures (TTP) within an environment that have evaded or haven’t yet been picked up by existing detection technologies. Part of the difficulty of efficient and successful threat hunting is that it’s often conducted chaotically due to a […]
Threat Spotlight: Cyber Warfare & Security in the 21st Century
Executive Summary Michael Morell is a career intelligence analyst with decades of experience in national cybersecurity. He’s served in roles like Former Deputy Director and twice Acting Director of the CIA from 2009 to 2013. Norman Menz, CEO of Flare, co-founded the third-party risk management provider Prevalent, before joining AI-driven vulnerability management startup Delve as […]
Flare Slashed Dark Web Investigation Time by 97% for a Leading Managed Security Service Provider
Overview Managed Security Service Providers (MSSPs) can have difficulty monitoring the dark web for their clients. Marketplaces routinely go down or change locations, and the addition of Telegram and unconventional illicit markets like Genesis market has made it even more difficult to effectively monitor thousands of sources for cyber risk. This success story highlights how […]
Dark Web Statistics to Illuminate Your Cybersecurity Approach
Happy Cybersecurity Awareness Month! The dark web can seem like a haunted house with mysteries in each corner. However, addressing facts and statistics about it can help you and your cybersecurity team prevent attacks. We’ve collected some spooky dark web statistics and facts to better inform your cybersecurity practices. 1. The Flare database has monitored […]