Illicit Telegram Groups: A New Dark Web Frontier?

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Illicit Telegram Groups: A New Dark Web Frontier?" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The shady underworld of the dark web provides cybercriminals with an outlet to trade stolen information, tools, or malware, hold victims of cyber attacks to ransom, and discuss their targets and tactics. But the dark web forums that normally host illicit marketplaces and discussions are starting to lose their allure. Find out why the messaging […]

Threat Spotlight: Top Illicit Sources to Monitor in 2023

A navy background with the white text "Top Illicit Sources to Monitor in 2023"

Executive Overview The top illicit communities to monitor this year are a mix of dark web forums, markets/autoshops, and illicit communities across the instant messaging app Telegram. Most of them had previously existed, and are more recently gaining traction.  A comprehensive cyber threat intelligence strategy includes following a wide range of illicit sources to best […]

Threat Spotlight: 12 Days of Threats

White text "12 Days of Threats" over navy patterned background

Executive Summary 1. Russian Market (Infected Devices & the Growing Threat of Stealer Malware) Infected device markets sell access to infected computers and browser fingerprints that can be used by threat actors to compromise online accounts. Like identity theft, the infected device can reveal a wealth of personal information about the victim, like where they […]

Social Network of Information: How Threat Actors Take Advantage of Social Media

The white text "Social Network of Information: How Threat Actors Take Advantage of Social Media" over a blue background layered over a smartphone held with hands with like icons in circles floating above it.

Social media platforms serve many important functions like connecting long distance family members, reconnecting old friends, finding jobs, and more. However, as they store and encourage sharing personal information such as birthdays, locations, and hobbies, the wrong person putting these pieces together can lead to harmful repercussions.  Social media companies hold millions of peoples’ personal […]

Threat Spotlight: Dark Web Data Breaches

Executive Summary There are 10 billion stolen credentials on the dark web. They continue to be one of the top means of compromise for cyberattacks and could lead to disastrous data breaches for individuals and organizations. Flare’s Co-Founder and Chief Product Officer Yohan Trépanier Montpetit and Director of Marketing Eric Clay talk through the findings […]

Threat Spotlight: Cyber Warfare & Security in the 21st Century

A navy background with the white text "Cyber Warfare & Security"

Executive Summary Michael Morell is a career intelligence analyst with decades of experience in national cybersecurity. He’s served in roles like Former Deputy Director and twice Acting Director of the CIA from 2009 to 2013. Norman Menz, CEO of Flare, co-founded the third-party risk management provider Prevalent, before joining AI-driven vulnerability management startup Delve as […]

Threat Spotlight: Key Trends in Illicit Communities

A navy background with the white text "Key Trends in Illicit Communities"

Executive Summary Over the years, we’ve been monitoring illicit communities on the clear web, dark web, and instant messaging platforms, and observing interesting trends. These trends have also given us an idea of what to expect going into 2023.  Check out our full webinar recording, Illicit Communities in 2022: Key Trends to Monitor for Illicit […]

Dark Web Statistics to Illuminate Your Cybersecurity Approach

dark web statistics

Happy Cybersecurity Awareness Month! The dark web can seem like a haunted house with mysteries in each corner. However, addressing facts and statistics about it can help you and your cybersecurity team prevent attacks. We’ve collected some spooky dark web statistics and facts to better inform your cybersecurity practices.  1. The Flare database has monitored […]

Top 5 Leaked Credentials Horror Stories

top 5 leaked credentials horror stories

Leaked credentials can be both the cause and effect of data breaches. Regardless of the resources invested into cybersecurity, organizations are unfortunately not immune to cyberattacks.  There have been a number of disastrous data breaches in this past year. We’ll highlight the top 5 leaked credentials horror stories of the past few months (in no […]

Threat Spotlight: Leaked Credentials and Geography

A navy background with the white text "Leaked Credentials & Geography"

Executive Summary Leaked credentials are the cause of many cyberattacks, and the number of them on the dark web continues to grow rapidly: there are over 10 billion unique username password combinations once duplicates and combo lists have been removed.  Flare has been monitoring and archiving the dark web for over 5 years, which has […]