Make
More Intelligent
Decisions

Mitigate risk with human-driven intelligence from the Deep & Dark Web. More

Trusted by Industry Leaders

Flashpoint is proud to support organizations large and small across sectors such as Finance, Healthcare, Retail, Legal,
Media, Technology, Telecommunications, and Government.
7 of the Top 10

Largest Global
Financial Institutions

3 of the Top 5

Health Insurance
Providers

3 of the Top 10

Largest
US Retailers

4 of the Top 10

Media & Telecom
Companies

Our Use Cases

Smart People,
Targeted Technology

Business Risk Intelligence (BRI) derived from the Deep & Dark Web requires the
right mix of people, data, and technology, to provide organizations with the
unique contextual intelligence they need to make more informed decisions.

Subject Matter Expertise
Years immersed in impenetrable online regions culminates in elite tradecraft

More

Proprietary Software
Our analysts’ keen insights drive targeted data acquisition at scale to maximize efficiency, accuracy, and relevancy

The Deep & Dark Web

Harboring illicit activities and critical data, these exclusive online regions are inaccessible without advanced technologies and specialized expertise

Stored, Structured, and Sanitized
Safely access historical and near real-time data from dangerous venues across the Deep & Dark Web in one structured platform

Stored & Structured

pic_platform

INTELLIGENCE
REPORTING
Our analysts’ most critical findings, hand-picked, prioritized, and packaged in intra-daily reports

More

pic_reports

CURATED
ALERTING
Comprehensive monitoring and relevant reporting tailored to your needs

More

 

pic_subject

Analyst
Assistance
Directly access our analyst team for customized threat investigations

More

pic_alerting

API
 & PORTAL
Tools to access and perform research on Deep & Dark Web data in order to discover valuable insights

More

Global Coverage

Innovating the risk landscape
Our analysts scour the Deep & Dark Web at scale to pinpoint current and emerging cyber and physical threats so organizations can effectively deploy security measures to mitigate risk.
Our people are paramount
Flashpoint’s multilingual intelligence analysts have been mapping uncharted regions of the internet for over a decade. Their intimate familiarity with the Deep & Dark Web affords exclusive access to these impenetrable communities.
Language
Competencies Include:

Arabic
Mandarin
Farsi
Turkish
Kazakh
Spanish
French
German
Russian
Ukrainian
Italian
Portuguese

Risk
Intelligence
Applications

Business Risk Intelligence (BRI)

Business Risk Intelligence (BRI) broadens the scope of intelligence beyond threat detection in the cyber domain to provide relevant context to business units not traditionally afforded the benefits of intelligence from the Deep & Dark Web. By informing decision-making and improving preparation, BRI mitigates risk across the enterprise.


BRI can not only bolster cybersecurity but also confront fraud, detect insider threats, enhance physical security, assess M&A opportunities, and address vendor risk and supply chain integrity. The results are better decisions that protect a company’s ability to operate.

Discover

We Know
Business Risk

Uncover the missing insightsUse BRI to elevate your intelligence vantage point to illuminate risk blind spots. Learn how our analysts’ keen insights and Deep & Dark Web discoveries are empowering organizations to make informed decisions.

Visit Our Intelligence Library
April 19, 2017 Cybercrime Economy

An Analysis of Criminal Communications Strategies

February 8, 2017 Emerging Tax Fraud Schemes in the Aftermath of 2016 Healthcare Breaches

From Healthcare Hackers to Tax Fraudsters

February 7, 2017 Flashpoint Case Study: Aflac

Aflac's top priority is to remain as informed and protected from potential threats and vulnerabilities as possible.

Visit Our Intelligence Library

Blog

April 25, 2017Dataset from “xDedic” Marketplace Suggests Government, Corporate RDP Servers TargetedBackground The xDedic marketplace is a predominant cybercriminal marketplace on the dark web known for hosting sales of access to compromised Remote Desktop Protocol (RDP) servers. RDP is Microsoft’s proprietary protocol that provides users with a graphical interface to connect to another computer over a network connection. System administrators frequently use RDP to control servers […]Read more
April 20, 2017Large Protests Expected for May Day 2017The origins of International Workers’ Day, also known as May Day, stem from an 1880s Chicago-based movement by labor unions to force the adoption of eight-hour work days. May 1, 1886, is considered the first official International Workers’ Day, which included several days of protests, violent clashes with police, and heavy anarchist involvement during the […]Read more
April 19, 2017Cybercrime Economy: An Analysis of Cybercriminal Communication StrategiesMalicious actors’ widespread preference for encrypted tools and services continues to fuel the ongoing debate over encryption. While jihadist groups such as ISIS first drew public attention to the issue during the high-profile battle between the FBI and Apple over the mobile phone belonging to one of the San Bernardino shooters in 2015, various threat […]Read more
More

Events

May 2, 2017 - Speaking Engagements
2017 SC Congress New York Keynote - 10:30 AM - 11:30 AM ESTInside a Breach – From Risk to Reality Here we will get a first hand view of a network breach in process. Tricks of the bad guy, what they are after vs. what is the risk, ways they avoid being noticed and of course suggestions on risk reduction techniques.  Lance James, Chief Scientist at FlashpointRead more
May 3, 2017 - Speaking Engagements
St. Gallen Symposium - 5/3/17 - 5/5/17Lance James, Chief Scientist at FlashpointRead more
More