Have questions for our experts? Curious about Business Risk Intelligence? Interested in Flashpoint’s solutions for your organization?
Please don’t hesitate to contact us using the contact form.
Partnership Inquiries: Become a Partner
For Media Inquiries: [email protected]
Access any one of our intelligence reports, use cases, or case studies to learn more about how to apply Business Risk Intelligence.
An examination of the threats banks and credit institutions face from cybercriminals and APT actors.
Flashpoint analyst Carles Lopez discusses the growth of Empire Market and how it is filling a void in the cybercriminal landscape
Flashpoint Rated a ‘Strong Performer’ in Research Report
Flashpoint research developer Zach Wikholm discusses how credential stuffing differs from traditional brute force account takeover (ATO) attacks
Combating Cyber Threats with Business Risk Intelligence (BRI)
Flashpoint's Threat Response and Readiness Subscription
Develop contingencies in the event of an attack, including establishing a process to ensure payments can be made securely and quickly
Information Sharing for Business Risk Intelligence
Senior Malware Researcher Christopher Elisan discusses how a threat actor spread the GandCrab ransomware
A comprehensive evaluation of risk exposure and threats on the DDW and open web targeting executives.
2018 Mid-year Update
Introduce the BRI framework and methodology for applying intelligence-informed risk-based decision-making across business and security applications
Trends in the usage of online platforms to propagate extremist content
Senior Analyst Ian Gray provides an overview of hacktivist operations
Business Risk Intelligence Knowledge and Training
Trusted Advisors Help Intelligence Teams to Achieve Objectives
A brief primer on DDoS using UDP reflection
How Pharmaceutical Companies Leverage Business Risk Intelligence (BRI)
How Hospitality Companies Leverage Business Risk Intelligence (BRI)
Create tailored alerts and respond to threats from both the DDW and open web in a timely manner
An overview of MaaS, defines three types of MaaS, and shares observations found in the Deep & Dark Web
How Manufacturers Leverage Business Risk Intelligence (BRI)
Insider Threat - Focusing from the Inside Out
Leveraging Business Risk Intelligence (BRI) to Combat Money Laundering
2017 End of Year Update
How Transportation Companies Leverage Business Risk Intelligence (BRI)
On January 3, 2018, Project Zero, Google’s team of security analysts and researchers primarily tasked with...
How Organizations Leverage Business Risk Intelligence (BRI) to Manage Third-Party Risk
Tips and best practices for operational security on computer and mobile devices while traveling.
How Insurers Leverage Business Risk Intelligence (BRI)
How the Telecommunications Sector Leverages Business Risk Intelligence (BRI)
Correlation and Causation Tracking Adversaries in the Underground
Flashpoint Analysis Provides Visibility into the Inner Workings of the Underground Economy
How the Aviation Sector Leverages Business Risk Intelligence (BRI)
A summary of the Korean-language underground, and how the underground has diminished in 2017
Following the takedown of both AlphaBay and Hansa Market, threat actors are seeking refuge on the DDW.
Help users understand adversaries, automate workflows, and mitigate threats faster using threat intelligence.
Brings the most important part of an organization's threat operations and management framework together
Combines threat data from feeds and other sources with data from inside the network
Analyze data from hundreds of thousands of open sources
Highly Curated Datasets | Supported Data Formats | Easy Integration
How Business Risk Intelligence Supports the Merger and Acquisition Due Diligence Process
How the Media Sector Leverages Business Risk Intelligence (BRI)
The Russian government introduced new laws and policies to monitor & control internet activity in Russia, ostensibly as a security measure.
How Flashpoint's Business Risk Intelligence (BRI) Helps Combat Physical Security Threats
How Flashpoint's Business Risk Intelligence (BRI) Helps Combat Insider Threats
How the Oil and Gas Sector Leverages Business Risk Intelligence (BRI)
Cybercrime Analyst Olivia Rowley discusses new methods to bypass EMV protections.
Proactively Monitor and Address Business Risk
Flashpoint Contributes BEC Research to Cisco 2017 Midyear Cybersecurity Report.
An overview of the twelfth G20 Summit 2017 and analyze the physical and cyber campaigns target this event
BRI empowers tech companies to proactively address relevant threats and mitigate risk across business functions.
2017 Mid-year Edition
An overview of "Satan" ransomware, a new strand of Ransomware-as-a-Service (RaaS) that allows users to customize ransom conditions...
Make Better, More Informed Decisions
How Flashpoint's Business Risk Intelligence (BRI) Helps Combat Fraud
Emerging Fraud Trend Emphasizes Critical Need to Address Security of Gift Cards
Analyze the trend of connectors and provide an example through the threat actor "Flokibot"...
An Analysis of Criminal Communications Strategies
How Retailers Leverage Business Risk Intelligence (BRI) from the Deep & Dark Web
Detail how threat actors are able to skim these chip-based cards...
Enterprise Strategy Group Solutions Showcase
How Law Firms Leverage Business Risk Intelligence (BRI) from the Deep & Dark Web
An overview of China's National Cybersecurity Law...
From Healthcare Hackers to Tax Fraudsters
Aflac's top priority is to remain as informed and protected from potential threats and vulnerabilities as possible.
Flashpoint Business Risk Intelligence (BRI) derived from the Deep & Dark Web empowers healthcare organizations
Flashpoint works with 7 of the top 10 global financial institutions to provide business risk intelligence
An overview of these groups and details the high-profile DDoS campaign led by "Aslan Neferler Tim"...
2016 Year in Review and 2017 Flashpoints
An Analysis for Financial Institutions and Commercial Organizations Looking to Reduce Risk
New research identifies 36 technologies that facilitate the online operations of radical jihadist groups.
Inside an Organized Russian Ransomware Campaign
Cybercriminals Find Value in Holding Data Hostage as Alternative to Putting it Up For Sale
Gain valuable insights on building your company’s internal capabilities for Deep & Dark Web Intelligence.
The Emergent Cyber Threat Landscape
The March 22, 2016 attacks in Brussels appear increasingly connected to the November 13, 2015, attacks in Paris.
Our analysts discuss terrorist motivations, tactics, and future implications in the wake of the March 22, 2016 attacks in Brussels.
A Case for Proactive Cyberintelligence
The Funding and Financing of ISIS
The next frontier in comprehensive IT security
Ready to make more intelligent decisions?