Threat Spotlight: Triple Extortion Ransomware

A navy background with the white text "Triple Extortion Ransomware."

Executive Overview Threat actors have escalated the single extortion ransomware attack model to double and even triple extortion.  With the commodification of cybercrime, adversaries have significantly increased the sophistication levels of their operations, and therefore also the potential devastating impacts of a ransomware attack.  Flare Director of Marketing Eric Clay and CTO & Co-Founder Mathieu […]

Threat Spotlight: Bypassing Safeguards on Generative AI

A navy background with the white text "Bypassing Safeguards on Generative AI."

There are two major trends coming together in the realm of cyber threats: 1) generative AI applications are redefining how we engage with each other and our environments, and 2) threat actors are abusing these same generative AI applications that are creating new positive possibilities to manipulate them for malicious purposes. (Check out our last […]

5 Key Dark Web Forums to Monitor in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "5 Key Dark Web Forums to Monitor in 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The dark web is often a mysterious and misunderstood corner of cyberspace. Often misrepresented as accessible from the greater public view of the internet, the dark web is actually not as readily as accessible as it may seem to be. This is because it is a non-public facing corner of the internet that isn’t visible […]

Top 5 Dark Web Marketplaces to Monitor

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Top 5 Dark Web Marketplaces." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Whatever your role in infosec, you probably know by now that dark web marketplaces offer budding and expert hackers various tools, data, credentials, ransomware, and malware for sale, with payment usually made via cryptocurrency. It’s in this underground landscape of shady buyers and sellers where dark web threats often lurk undetected until it’s too late […]

The Genesis Market & Infostealer Malware Threat: What You Need to Know

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "The Genesis Market & Infostealer Malware Threat: What You Need to Know." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

One of the most challenging developments in recent years in defending against cyber attacks is the emergence of cyber crime marketplaces. Often accessible on both the dark and clear web, these marketplaces offer an outlet for threat actors to trade in stolen information, hacking tools, and even hacking services.  This article focuses on the popular […]

Telegram Fraud & Cybercrime: A Rising Concern in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Telegram Fraud: A Rising Concern in 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Criminals are consistently looking for new ways to exploit consumers and businesses. Today’s online communication channels, such as social media and messaging apps, have recently become a prime target for many scammers. One cyber threat trend that has been increasing is the issue of Telegram cybercrime scams.  Threat actors routinely use Telegram to share leaked […]

How the Dark Web is Embracing ChatGPT and Generative AI

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "How the Dark Web is Embracing ChatGPT and Generative AI." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

ChatGPT and GPT-4 have been dazzling their users with their linguistic prowess. But, have you ever wondered if (and how) these large language models (LLMs) are also making a splash in the darker corners of the internet? It turns out that threat actors are indeed finding creative ways to exploit the technological marvels of generative […]

Threat Spotlight: Generative AI

A navy background with the white text "Generative AI."

Two converging trends are on the precipice of reshaping the cyber threat landscape dramatically. The world is in the midst of a technological revolution that looks likely to cause significant and disruptive changes to society. Generative AI applications are poised to revolutionize the way we work, learn, and interact with our environment. Unlike some previous […]

Threat Actors: The Definitive 2023 Guide to Cybercriminals

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Actors: The Definitive 2023 Guide to Cybercriminals." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

In a digital world, companies collect more data and more types of data than ever before. As people use more technology, they generate new types of sensitive data. While data protection laws and compliance frameworks often detail categories of information requiring enhanced protection, they fail to keep pace with technological advances. When people understand the […]

Threat Spotlight: Dark Web Supply Chain

A navy background with the white text "Dissecting the Dark Web Supply Chain."

Executive Overview Stealer logs are a threat for every company. Threat actors infect devices with stealer malware, exfiltrate the browser fingerprints & saved logins in the browser, and sell them on dedicated dark web marketplaces for less than $50. Breaches caused by stealer logs can cause hundreds of thousands if not millions of dollars of […]