Check out Threat Flow, the Security Industry’s First Transparent Generative AI Application

Threat Spotlight: 12 Days of Threats

White text "12 Days of Threats" over navy patterned background

Executive Summary 1. Russian Market (Infected Devices & the Growing Threat of Stealer Malware) Infected device markets sell access to infected computers and browser fingerprints that can be used by threat actors to compromise online accounts. Like identity theft, the infected device can reveal a wealth of personal information about the victim, like where they […]

OSINT in Cybersecurity: Effectively Leveraging Open-Source Intelligence to Drive Enterprise Security Value in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "OSINT in Cybersecurity: Effectively Leveraging Open Source Intelligence to Drive Enterprise Security Value." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

OSINT is a critical aspect of a competent cybersecurity program. Once an organization has the basics in place such as EDR, multi-factor authentication, network monitoring, and robust firewall rules, conducting effective open-source intelligence represents a significant opportunity for organizations to improve their cyber readiness. Cybersecurity OSINT enables companies to: What is Open Source Intelligence (OSINT)? […]

Attack Surface Monitoring: The Definitive 2023 Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Attack Surface Monitoring: The Definitive Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Today’s threat actors constantly probe your IT ecosystem for ways to gain unauthorized access and achieve their goals. Thinking like an attacker to figure out the paths of least resistance into your environment is imperative in protecting your digital assets and thwarting attacks. These paths together make up your attack surface—the complete set of entry […]

Our CTF is Currently Closed – Please Check Back Later

CTF The text Capture the Threats in orange over a dark blue background. There is a cartoon man with a Flare logo on his shirt holding a net.

Our CTF: Capture the Threats is currently closed. Please check here or follow our social media for for further updates: • LinkedIn • Twitter • Facebook We’ve launched CTF: Capture the Threats so you can upgrade your threat hunting skills while having fun. The game includes four categories of 12 challenges to stop a threat […]

Social Network of Information: How Threat Actors Take Advantage of Social Media

The white text "Social Network of Information: How Threat Actors Take Advantage of Social Media" over a blue background layered over a smartphone held with hands with like icons in circles floating above it.

Social media platforms serve many important functions like connecting long distance family members, reconnecting old friends, finding jobs, and more. However, as they store and encourage sharing personal information such as birthdays, locations, and hobbies, the wrong person putting these pieces together can lead to harmful repercussions.  Social media companies hold millions of peoples’ personal […]

Threat Spotlight: Dark Web Data Breaches

Executive Summary There are 10 billion stolen credentials on the dark web. They continue to be one of the top means of compromise for cyberattacks and could lead to disastrous data breaches for individuals and organizations. Flare’s Co-Founder and Chief Product Officer Yohan Trépanier Montpetit and Director of Marketing Eric Clay talk through the findings […]

Building Your Threat Hunting Framework: Key Considerations

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Building Your Threat Hunting Framework: Key Considerations." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat hunting shifts security operations from reactive to proactive by searching for signs of attacker tactics, techniques, and procedures (TTP) within an environment that have evaded or haven’t yet been picked up by existing detection technologies. Part of the difficulty of efficient and successful threat hunting is that it’s often conducted chaotically due to a […]

Threat Spotlight: Cyber Warfare & Security in the 21st Century

A navy background with the white text "Cyber Warfare & Security"

Executive Summary Michael Morell is a career intelligence analyst with decades of experience in national cybersecurity. He’s served in roles like Former Deputy Director and twice Acting Director of the CIA from 2009 to 2013. Norman Menz, CEO of Flare, co-founded the third-party risk management provider Prevalent, before joining AI-driven vulnerability management startup Delve as […]

Flare Slashed Dark Web Investigation Time by 97% for a Leading Managed Security Service Provider

Overview Managed Security Service Providers (MSSPs) can have difficulty monitoring the dark web for their clients. Marketplaces routinely go down or change locations, and the addition of Telegram and unconventional illicit markets like Genesis market has made it even more difficult to effectively monitor thousands of sources for cyber risk.  This success story highlights how […]

Dark Web Statistics to Illuminate Your Cybersecurity Approach

dark web statistics

Happy Cybersecurity Awareness Month! The dark web can seem like a haunted house with mysteries in each corner. However, addressing facts and statistics about it can help you and your cybersecurity team prevent attacks. We’ve collected some spooky dark web statistics and facts to better inform your cybersecurity practices.  1. The Flare database has monitored […]