Flare’s Dark Web Monitoring Reduces Leading Bank’s Threat Identification Time to Minutes
Overview How can a CTI team thoroughly and quickly monitor the billions of leaked credentials on the dark web? The CTI team of a major North American bank had difficulty with three main pain points: 1) prevent day-to-day cyber fraud, 2) gain better insight into critical threats, and 3) immediately optimize the team’s resources. This […]
Flare Slashed Dark Web Investigation Time by 97% for a Leading Managed Security Service Provider
Overview Managed Security Service Providers (MSSPs) can have difficulty monitoring the dark web for their clients. Marketplaces routinely go down or change locations, and the addition of Telegram and unconventional illicit markets like Genesis market has made it even more difficult to effectively monitor thousands of sources for cyber risk. This success story highlights how […]
Flare’s GitHub Monitoring Cut Incident Response Costs Significantly for a Large North American Bank
Overview According to a study with Stanford University Professor John Hancock and security firm Tessian, human error contributes to 88% of data breaches. Employee mistakes may seem harmless, but they can lead to leaked credentials, API keys, personally identifiable information, and intellectual property. This success story explains how Flare’s GitHub monitoring caught a previous employee […]
Flare’s Infected Device Market Monitoring Prevented a Data Breach for an Investment Firm’s Portfolio Company
Overview Infected Devices are an increasingly common cause of data breaches. Threat actors install Redline/Raccoon malware through phishing emails or malicious ads, then sell access to the “fingerprint” of the browser on dark web markets with the potential to bypass MFA controls and access to all logins stored in the browser. Unlike stolen credentials, identifying […]