Syndicated Blog

Flare | Cyber Threat Intel | Digital Risk Protection
Attackers Shouldn’t Have the Information Advantage
A navy background with the white text in all caps "Initial Access Brokers on Russian Hacking Forums."

Threat Spotlight: Initial Access Brokers on Russian Hacking Forums

Russian Hacking Forum Trends Initial access brokers (IAB) are sophisticated, focused, and specialized threat actors that focus on finding and gaining access to corporate environments. Once they compromise these environments, they auction ...
New "Dark Web" Generative AI Chatbots?!

Threat Spotlight: The Dark Web and AI

| | Blog, Dark Web Insider, Threat Spotlight
Executive Overview More than 200,000 credentials to AI language models are currently being sold on the dark web as part of stealer logs, files containing thousands of credentials derived from infostealer malware ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Intelligence Analytics: Making the Most of Your CTI Program." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat Intelligence Analytics: Making the Most of Your CTI Program

| | Blog, CTI Strategies
The threat landscape has never been more challenging for CISOs and security teams than in 2023. Our research has found ransomware attacks have increased by more than 100% since 2022, hundreds of ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Dark Web Analytics: Detecting Threats Across the Dark Web." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Dark Web Analytics: Detecting Threats Across the Dark Web

| | Blog, CTI Strategies
The nebulous part of the internet: the dark web, which traditional search engines don’t index, serves as a hub for cybercriminal activity, ranging from illicit trade in stolen data to planning sophisticated ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Executive Threat Protection: Executive Monitoring to Gain the Advantage." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Executive Threat Protection: Using Monitoring to Gain the Advantage

| | Blog, CTI Strategies
The risk of cyber threats has become an everyday reality for many organizations. This risk is amplified when it comes to company executives who, due to their high-profile nature and access to ...
A navy background with the white text in all caps "Stealer Logs & Corporate Access."

Threat Spotlight: Stealer Logs & Corporate Access

Executive Overview Over the last three years, infostealer malware variants have become a “popular trend” in the cybercriminal Malware-as-a-Service (MaaS) ecosystem. Doing precisely as their category implies, these malware variants steal information ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Actionable Threat Intelligence: Generating Risk Reduction from CTI." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat Intelligence Sharing: 5 Best Practices

| | Blog, CTI Strategies
To combat sophisticated and relentless threats effectively, organizations must adopt a collaborative approach that goes beyond their individual security measures. Threat intelligence sharing has emerged as a powerful strategy to enhance cybersecurity ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Actionable Threat Intelligence: Generating Risk Reduction from CTI." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Actionable Threat Intelligence: Generating Risk Reduction from CTI

| | Blog, CTI Strategies
Organizations need to go beyond traditional security measures to effectively protect their valuable assets and maintain a strong security posture. They must harness the power of actionable threat intelligence, which provides timely ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Actioning Threat Intelligence Data: The Definitive Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Actioning Threat Intelligence Data: The Definitive Guide

| | Blog, CTI Strategies
Threat intelligence data plays a pivotal role in strengthening any organization’s defense systems. Actionable threat intelligence is critical, and it is an important function in active defense measures. It provides immense benefits ...
Cybersecurity AI: Threat Actor Profiling Provides Instant Insights

Cybersecurity AI: Threat Actor Profiling Provides Instant Insights

Generative artificial intelligence (AI) and large language models (LLM) dominate current technology conversations. From ChatGPT to DALLE 2, generative AI has become the new hype technology overtaking the corporate world. With all ...