More Intelligent

Gain a decision advantage over threats and adversaries with human-powered analysis and sophisticated technology. More

Trusted by Industry Leaders

Flashpoint is proud to support organizations across 22 verticals, with a
global footprint that includes EMEA and APAC, including Public Sector.
7 of the Top 10

Largest Global
Financial Institutions

3 of the Top 5

Health Insurance

4 of the Top 10

Global Retailers

4 of the Top 10

Media & Telecom

Our Use Cases

Smart People,
Targeted Technology

Business Risk Intelligence (BRI) derived from the Deep & Dark Web requires the
right mix of people, data, and technology, to provide organizations with the
unique contextual intelligence they need to make more informed decisions.

Subject Matter Expertise
Years immersed in impenetrable online regions culminates in elite tradecraft


Proprietary Software
Our analysts’ keen insights drive targeted data acquisition at scale to maximize efficiency, accuracy, and relevancy

The Deep & Dark Web

Harboring illicit activities and critical data, these exclusive online regions are inaccessible without advanced technologies and specialized expertise

Stored, Structured, and Sanitized
Safely access historical and near real-time data from dangerous venues across the Deep & Dark Web in one structured platform

Stored & Structured

Intelligence reports and Insights in a single, finished intelligence experience


Insights from Finished Intelligence, Deep & Dark Web data, and Risk Intelligence Observables



Enrich an organization’s security ecosystem with targeted data from highly curated sources


Flashpoint Intelligence AcademyBusiness Risk Intelligence education to reduce an organization’s overall risk exposure


Global Coverage

Innovating the risk landscape
Our analysts scour the Deep & Dark Web at scale to pinpoint current and emerging cyber and physical threats so organizations can effectively deploy security measures to mitigate risk.

Our people are paramount
Flashpoint’s multilingual intelligence analysts have been mapping uncharted regions of the internet for over a decade. Their intimate familiarity with the Deep & Dark Web affords exclusive access to these impenetrable communities.

Competencies Include:



Business Risk Intelligence (BRI)

Business Risk Intelligence (BRI) broadens the scope of intelligence beyond threat detection in the cyber domain to provide relevant context to business units not traditionally afforded the benefits of intelligence from the Deep & Dark Web. By informing decision-making and improving preparation, BRI mitigates risk across the enterprise.

BRI can not only bolster cybersecurity but also confront fraud, detect insider threats, enhance physical security, assess M&A opportunities, and address vendor risk and supply chain integrity. The results are better decisions that protect a company’s ability to operate.


We Know
Business Risk

Uncover the missing insightsUse BRI to elevate your intelligence vantage point to illuminate risk blind spots. Learn how our analysts’ keen insights and Deep & Dark Web discoveries are empowering organizations to make informed decisions.

Visit Our Intelligence Library
September 11, 2018 The Forrester New Wave™: External Threat Intelligence Services, Q3 2018

Flashpoint Rated a ‘Strong Performer’ in Research Report

August 28, 2018 Credential Stuffing

Flashpoint research developer Zach Wikholm discusses how credential stuffing differs from traditional brute force account takeover (ATO) attacks

August 17, 2018 Business Risk Intelligence for Cybersecurity

Combating Cyber Threats with Business Risk Intelligence (BRI)

Visit Our Intelligence Library


September 19, 2018Access to Thousands of Breached Sites Found on Underground MarketAccess to approximately 3,000 breached websites has been discovered for sale on a Russian-speaking underground marketplace called MagBo. Access to some of the sites is selling for as low as 50 cents (USD). Analysts at Flashpoint who discovered the availability of access to the breached sites said that most of the victims come from ecommerce, […]Read more
September 18, 2018Automation No Substitution for Context When Evaluating ThreatsAutomation streamlines—even replaces—tasks and controls at the core of many security practices. With these efficiency gains, reliance on automation can sometimes convince security analysts and network operators that there is no substantial need to proactively understand threats to the business, how adversaries operate, and why you’re a target to begin with. Failing to fully understand […]Read more
September 17, 2018RDP Access to Hacked Servers Still a Thriving Business on Deep & Dark WebDeep & Dark Web markets selling remote desktop protocol (RDP) access to hacked servers or tools that scan for and brute-force these instances continue to thrive for a number of reasons, not the least of which is the money, time and effort RDP access spares a criminal entity from having to develop more complex attacks. […]Read more


September 21, 2018 - Speaking Engagements
Account Takeover and Credential Stuffing: What’s Yours, is Mine - 9:15 AM – 10 AM ETFlashpoint analyst David Shear will discuss account takeover, an overview of threat actors associated with these types of attacks, and a demo of credential stuffing attack from attacker and defender sides. Taking place at Anomali Detect ’18.Read more
September 21, 2018 - Flashpoint events
Arizona InfraGard Charity Golf Open 2018 - 9/21/18Flashpoint is a proud sponsor of the sixth annual Arizona InfraGard Charity Golf Open.
September 27, 2018 - Flashpoint events
RiskIQ Threat Hunting Workshop Boston - 8:30 AM - 3:20 PM ESTCPE credits available.Read more