
Dig into the Dark Web with Flare: Play CTF
Have you heard about Flare’s CTF: Capture the Threats? We created this game so players can further sharpen their skills in exploring the darker corners of the cyber world to stop malicious actors. The game includes four categories: credential leaks, illicit markets (dark web and social media), open web (GitHub, ... Read More

Threat Intelligence Feeds: 9 Valuable Sources of CTI
Among the many available sources of cyber threat intelligence (CTI), threat intelligence feeds are incredibly valuable for staying informed about the latest threats and potential indicators about those threats. Whether observed in the wild and reported by real users or gathered by decoy systems that lure attackers in, threat intel ... Read More

Threat Spotlight: Top Illicit Sources to Monitor in 2023
Executive Overview The top illicit communities to monitor this year are a mix of dark web forums, markets/autoshops, and illicit communities across the instant messaging app Telegram. Most of them had previously existed, and are more recently gaining traction. A comprehensive cyber threat intelligence strategy includes following a wide range ... Read More
Operational Threat Intelligence: The Definitive Guide
Cyber threat intelligence involves gathering and analyzing an assortment of disparate data to help make prompt and effective security decisions related to current or potential attacks and adversaries. But simply lumping all of this information under a general label like “cyber threat intelligence” ignores the fact that there are different ... Read More

Data Breach Prevention: Identifying Leaked Credentials on the Dark Web
Threat actors deploy many tactics, techniques and procedures (TTPs) to get access to sensitive data assets. Among this arsenal of weapons, obtaining correct user credentials (username and password pairs) that can be used for credential stuffing attacks plays a central role in most data breaches. Poor password hygiene makes some credentials ... Read More

The Threat Intelligence Lifecycle: A Definitive Guide for 2023
Building an effective threat intelligence program that disseminates actionable data that results in real-world risk reduction has never been more critical than in 2023. Threats to enterprise organizations ranging from geopolitical risk to sophisticated ransomware groups continue to proliferate while many security teams struggle to integrate dozens of tools together ... Read More
Threat Intelligence in 2023: The Definitive Guide
Threat Intelligence provides organizations with timely, relevant information about threats to their business. Threat intelligence can come in many different forms and includes four primary layers, strategic threat intelligence, tactical threat intelligence, operational threat intelligence, and technical threat intelligence. Organizations with mature threat intelligence functions in place are able to ... Read More

Flare’s Dark Web Monitoring Reduces Leading Bank’s Threat Identification Time to Minutes
Overview How can a CTI team thoroughly and quickly monitor the billions of leaked credentials on the dark web? The CTI team of a major North American bank had difficulty with three main pain points: 1) prevent day-to-day cyber fraud, 2) gain better insight into critical threats, and 3) immediately ... Read More

Top 5 Most Asked Questions at BSides
This year, the Flare team had many opportunities to attend BSides conferences across Canada and the U.S. It was a special experience to join local BSides conferences as well as travel to cities and visit cybersecurity communities. BSides conferences mean a lot to us at Flare because hosting affordable, local ... Read More

Threat Spotlight: 12 Days of Threats
Executive Summary 1. Russian Market (Infected Devices & the Growing Threat of Stealer Malware) Infected device markets sell access to infected computers and browser fingerprints that can be used by threat actors to compromise online accounts. Like identity theft, the infected device can reveal a wealth of personal information about ... Read More