Check out Threat Flow, the Security Industry’s First Transparent Generative AI Application

Breaking up the Phishing Attack Chain

phishing attack example

Phishing remains a popular attack method for malicious actors. This attack method is made possible by the wealth of services phishers can purchase on illicit markets: mass mailers, email lists, fake websites etc. Phishing attacks have been on the rise, registering a 250% growth between 2018 and 2019 according to a Microsoft report. In this […]

How To Identify The Next Major Cyber Threats through Job Postings

A significant challenge for security teams is to extract intelligence from open-source information. Malicious actors routinely post advertisements like the one below. This actor is offering up a method, but provides little to no clues as to how that method works, and how to protect against it. This is just an example of how challenging […]

Dorking: Preventing Leaks From Hurting Your Firm

dorking

While readily available, malware is far from being the only tool that malicious actors use to steal data and illegally access computer networks. Malicious actors indeed threaten firms’ security using far more mundane and everyday techniques. Case in point: taking advantage of Google, the world’s most popular search engine, to find confidential information and vulnerabilities […]

The Risks of Using Corporate Emails for Personal Services

The Risks Of Using Corporate Emails For Personal Services

  Everyday, Flare Systems collects leaked usernames and passwords on the internet and the darkweb. Our customers use our extensive leaked credentials database to prevent credential stuffing attacks. Credential stuffing happens when malicious actors take a database of leaked usernames and passwords and test these credentials on a different website. If the victims reused the […]