Grief Ransomware Group: What You Need to Know

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Grief Ransomware Group: What You Need to Know." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Among the multitude of threat actors dominating the cybersecurity landscape, Grief ransomware group has risen to prominence. Known for their ruthless attacks and uncompromising tactics, Grief has quickly carved a niche for itself in the dark underworld of cybercrime. Understand their methods to better anticipate their moves and boost your defenses. Understanding the Grief Ransomware […]

Threat Spotlight: “Legal” Cybercrime Activities

A navy background with the white text "'Legal' Cybercrime Activities"

Executive Overview We often generalize threat actors as the “attackers” and cyber practitioners as the “defenders.” This simplification can work for many purposes, but what if we’re missing key relationships because of it? Not all activities related to cybercrime require secrecy or direct malicious intent, so cybercriminals utilize a vast network of contractors to develop […]

Top Cybercrime Forums to Monitor in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Top Cybercrime Forums to Monitor in 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

As cyber threats continue to evolve in complexity and frequency, staying informed about the latest trends and emerging threats is crucial for cybersecurity professionals. One effective way to do this is by monitoring top cybercrime forums, where threat actors often discuss new tactics, techniques, and tools.  This article will provide an overview of the most […]

Threat Tracking: Tracking Threats Across the Dark and Clear Web

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Tracking: Tracking Threats Across the Dark and Clear Web." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The Internet is a gold mine of threat information that can bolster your cyber defenses if you actively track this data. From news updates to forum discussions on hacker forums, and data dumps to service offerings on marketplaces, there’s a lot to find out that could otherwise slip under the radar.  Tracking cyber threats across […]

Threat Spotlight: The New Dark Web?

A navy background with the white text "The New Dark Web?"

Executive Overview Illicit Telegram channels have become a growing concern in the realm of cybercrime. Threat actors want to connect with each other in fast, reliable, and “anonymous” ways. Telegram has been their answer, and malicious actors are increasingly moving off of Tor and onto the instant messaging platform.  Flare Director of Marketing Eric Clay […]

The Typology of Illicit Telegram Channels

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "The Typology of Illicit Telegram Channels." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Cybercriminals seem to always be looking for new and innovative ways to commit their crimes more efficiently. In the past, the dark web and parts of the deep web were some of the most common places where you can find cybercriminals committing their schemes. However, many criminals have moved over to more secure online messaging […]

Threat Spotlight: Triple Extortion Ransomware

A navy background with the white text "Triple Extortion Ransomware."

Executive Overview Threat actors have escalated the single extortion ransomware attack model to double and even triple extortion.  With the commodification of cybercrime, adversaries have significantly increased the sophistication levels of their operations, and therefore also the potential devastating impacts of a ransomware attack.  Flare Director of Marketing Eric Clay and CTO & Co-Founder Mathieu […]

Threat Spotlight: Bypassing Safeguards on Generative AI

A navy background with the white text "Bypassing Safeguards on Generative AI."

There are two major trends coming together in the realm of cyber threats: 1) generative AI applications are redefining how we engage with each other and our environments, and 2) threat actors are abusing these same generative AI applications that are creating new positive possibilities to manipulate them for malicious purposes. (Check out our last […]

5 Key Dark Web Forums to Monitor in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "5 Key Dark Web Forums to Monitor in 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The dark web is often a mysterious and misunderstood corner of cyberspace. Often misrepresented as accessible from the greater public view of the internet, the dark web is actually not as readily as accessible as it may seem to be. This is because it is a non-public facing corner of the internet that isn’t visible […]

Top 5 Dark Web Marketplaces to Monitor

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Top 5 Dark Web Marketplaces." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Whatever your role in infosec, you probably know by now that dark web marketplaces offer budding and expert hackers various tools, data, credentials, ransomware, and malware for sale, with payment usually made via cryptocurrency. It’s in this underground landscape of shady buyers and sellers where dark web threats often lurk undetected until it’s too late […]