OSINT in Cybersecurity: Effectively Leveraging Open-Source Intelligence to Drive Enterprise Security Value in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "OSINT in Cybersecurity: Effectively Leveraging Open Source Intelligence to Drive Enterprise Security Value." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

OSINT is a critical aspect of a competent cybersecurity program. Once an organization has the basics in place such as EDR, multi-factor authentication, network monitoring, and robust firewall rules, conducting effective open-source intelligence represents a significant opportunity for organizations to improve their cyber readiness. Cybersecurity OSINT enables companies to: What is Open Source Intelligence (OSINT)? […]

Attack Surface Monitoring: The Definitive 2023 Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Attack Surface Monitoring: The Definitive Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Today’s threat actors constantly probe your IT ecosystem for ways to gain unauthorized access and achieve their goals. Thinking like an attacker to figure out the paths of least resistance into your environment is imperative in protecting your digital assets and thwarting attacks. These paths together make up your attack surface—the complete set of entry […]

Our CTF is Currently Closed – Please Check Back Later

CTF The text Capture the Threats in orange over a dark blue background. There is a cartoon man with a Flare logo on his shirt holding a net.

Our CTF: Capture the Threats is currently closed. Please check here or follow our social media for for further updates: • LinkedIn • Twitter • Facebook We’ve launched CTF: Capture the Threats so you can upgrade your threat hunting skills while having fun. The game includes four categories of 12 challenges to stop a threat […]

Social Network of Information: How Threat Actors Take Advantage of Social Media

The white text "Social Network of Information: How Threat Actors Take Advantage of Social Media" over a blue background layered over a smartphone held with hands with like icons in circles floating above it.

Social media platforms serve many important functions like connecting long distance family members, reconnecting old friends, finding jobs, and more. However, as they store and encourage sharing personal information such as birthdays, locations, and hobbies, the wrong person putting these pieces together can lead to harmful repercussions.  Social media companies hold millions of peoples’ personal […]

Threat Spotlight: Dark Web Data Breaches

Executive Summary There are 10 billion stolen credentials on the dark web. They continue to be one of the top means of compromise for cyberattacks and could lead to disastrous data breaches for individuals and organizations. Flare’s Co-Founder and Chief Product Officer Yohan Trépanier Montpetit and Director of Marketing Eric Clay talk through the findings […]

Building Your Threat Hunting Framework: Key Considerations

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Building Your Threat Hunting Framework: Key Considerations." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat hunting shifts security operations from reactive to proactive by searching for signs of attacker tactics, techniques, and procedures (TTP) within an environment that have evaded or haven’t yet been picked up by existing detection technologies. Part of the difficulty of efficient and successful threat hunting is that it’s often conducted chaotically due to a […]

Threat Spotlight: Cyber Warfare & Security in the 21st Century

A navy background with the white text "Cyber Warfare & Security"

Executive Summary Michael Morell is a career intelligence analyst with decades of experience in national cybersecurity. He’s served in roles like Former Deputy Director and twice Acting Director of the CIA from 2009 to 2013. Norman Menz, CEO of Flare, co-founded the third-party risk management provider Prevalent, before joining AI-driven vulnerability management startup Delve as […]

Dark Web Statistics to Illuminate Your Cybersecurity Approach

dark web statistics

Happy Cybersecurity Awareness Month! The dark web can seem like a haunted house with mysteries in each corner. However, addressing facts and statistics about it can help you and your cybersecurity team prevent attacks. We’ve collected some spooky dark web statistics and facts to better inform your cybersecurity practices.  1. The Flare database has monitored […]

Top 5 Leaked Credentials Horror Stories

top 5 leaked credentials horror stories

Leaked credentials can be both the cause and effect of data breaches. Regardless of the resources invested into cybersecurity, organizations are unfortunately not immune to cyberattacks.  There have been a number of disastrous data breaches in this past year. We’ll highlight the top 5 leaked credentials horror stories of the past few months (in no […]

Spooky Ways to Ruin a Cybercriminal’s Day

Spooky Ways to Ruin a Cybercriminal's Day

It’s challenging to ruin a cybercriminal’s day because they only need one thing to work to gain access, while organizations must protect every potential attack surface. However, there are ways for everyone to contribute to a threat actor having a bad day.  We’ll discuss some major areas that work to malicious actors’ advantages (which can […]