Check out Threat Flow, the Security Industry’s First Transparent Generative AI Application

Continuous Monitoring of Web Reconnaissance Platform

Continous Monitoring of Web Recon

Using web reconnaissance platforms to monitor your attack surface or run investigations can be time-consuming, especially when we’re looking to understand what happened at a point in time in the past. These platforms do sometimes provide a view on all the past collected data included in a paid subscription, but navigating and interpreting the information […]

Why Clustering Malicious Actors Using AI Can Help with Organizational Cyber Risk – Part One

Clustering Malicious Actors Using AI - Part 1

In today’s digital world, malicious actors have access to a multitude of ways to preserve and increase their anonymity online. We recently posted an article highlighting various Open-Source Intelligence (OSINT) methods to profile cybercriminals on the darkweb, and you could consider this a follow-up and in-depth dive into the Artificial Intelligence (AI) based technologies we […]

What is Data Leakage? How Do You Prevent It?

What is Data Leakage

During 2020, on average every person created at least 1.7 MBs of data per second and around 44 zettabytes of data in terms of the complete digital world. Today, the amount of data we create, distribute, analyze and sell has been increasing at an incredibly fast rate. Due to this increase of potentially sensitive data, […]

What Is an Attack Surface and How do you Reduce it?

What is an Attack Surface

What Is An Attack Surface? An attack surface is the total number of all possible attack vectors (or points) where an attacker or unauthorized user can access a system and enter or extract data.  Attack surfaces can be split into two different categories. 1. Physical Attack Surface A physical attack surface area for an organization […]

Digital Risk Monitoring: A Quick Introduction

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "What is Digital Risk Monitoring?" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

It’s no secret that cyber threats are proliferating. In just the past 12 months, major ransomware attacks such as against Colonial Pipeline and against the U.S. meat industry have resulted in significant real-world impacts. At the same time major software providers such as Solarwinds have been the victim of large scale compromises. To counter the […]

What Is Domain Monitoring?

what is domain monitoring

Have you ever received an email from a colleague but in your gut felt that something was off? The spelling or grammar in the body of the message may have looked off, or the signature line different from past emails. Your spam filter may have even caught the email and flagged it as a potential […]

Dark Web Threat Intelligence: A Quick Guide

dark web threat intelligence

Building cyber threat intelligence capabilities has never been more important than in 2021. Attacks against businesses of all sizes are increasing rapidly. At the same time, the criminal underground is larger and more differentiated than ever. A single cyberattack against a business might involve dozens of threat actors each performing highly specialized roles. Gaining visibility […]

Information Leakage: What you need to Know

Information leakage poses a serious problem for thousands of companies around the world. Many software startups and even large, established enterprise organizations have difficulty ensuring that technical data is kept under lock and key. Problems proliferate with secrets being improperly committed on GitHub repositories and Amazon S3 buckets with poorly improperly configured permissions leaving sensitive […]

Dark Web Monitoring: A Quick Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Dark Web Monitoring: A Quick Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Organizations are concerned about the proliferation of threats on the dark web. Even as cybersecurity budgets have increased dramatically over the past decade, ransomware, phishing and other cyber threats have grown in intensity and frequency. For example, Flare’s Research team identified a surge in ransomware attacks from 2020 to 2021 – a total increase of […]

Digital Risk Protection (DRP) Glossary

DRP glossary

We are aware of the information overload and wealth of technical terms that may sometimes be confusing. To make it easier to understand industry terminology, we came up with some definitions of some of the most popular cybersecurity concepts. DRP In its 2020 report titled “Emerging Technologies: Critical Insights in Digital Risk Protection Services,” Gartner […]