Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Image
    Corporate & Physical Security
    Cyber and Physical Risks Targeting the 2026 Winter Olympics
    In this post we analyze the multi-vector threat landscape of the 2026 Winter Olympics, examining how the Games’ ...
    Read post
    Image
    Cyber Threat Intelligence
    Flashpoint’s Threat Intelligence Capability Assessment
    In this post we introduce a new free assessment designed to pinpoint intelligence gaps, top strategic priorities ...
    Read post
    Image
    Corporate and Physical Security
    Protecting the Big Game: A Threat Assessment for Super Bowl LX
    This threat assessment analyzes potential physical and cyber threats to Super Bowl LIX.
    Read post
    Image
    Cyber Threat Intelligence
    How China’s “Walled Garden” is Redefining the Cyber Threat Landscape
    In our latest webinar, Flashpoint unpacks the architecture of Chinese threat actor cyber ecosytem—a parallel ...
    Read post
    Image
    Cyber Threat Intelligence
    The Five Phases of the Threat Intelligence Lifecycle
    The threat intelligence lifecycle is a foundational framework for all fraud, physical security, and cybersecurity ...
    Read post
    Image
    Insider Threat
    Insider Threats: Turning 2025 Intelligence into a 2026 Defense Strategy
    In this post, we break down the 91,321 instances of insider activity observed by Flashpoint in 2025, examine the ...
    Read post
    Image
    Cyber Threat Intelligence
    The Top Threat Actor Groups Targeting the Financial Sector
    In this post, we identify and analyze the top threat actors that have been actively targeting the financial ...
    Read post
    Image
    Cyber Threat Intelligence
    Why Effective CTEM Must be an Intelligence-Led Program
    Continuous Threat Exposure Management (CTEM) is a continuous program and operational framework, not a single ...
    Read post
    Image
    Cyber Threat Intelligence
    Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
    The Justice Department announced two indictments in the Central District of California charging Ukrainian ...
    Read post
    Image
    Vulnerability Management
    Flashpoint Weekly Vulnerability Insights and Prioritization Report
    Anticipate, contextualize, and prioritize vulnerabilities to effectively address threats to your organization.
    Read post
    Image
    Infostealer
    The Infostealer Gateway: Uncovering the Latest Methods in Defense Evasion
    In this post, we analyze the evolving bypass tactics threat actors are using to neutralize traditional security ...
    Read post
    Image
    Cyber Threat Intelligence
    Surfacing Threats Before They Scale: Why Primary Source Collection Changes Intelligence
    This blog explores how Primary Source Collection (PSC) enables intelligence teams to surface emerging fraud and ...
    Read post
    There are no results that match your criteria.