CTF The text Capture the Threats in orange over a dark blue background. There is a cartoon man with a Flare logo on his shirt holding a net.

Dig into the Dark Web with Flare: Play CTF

| | Company News
Have you heard about Flare’s CTF: Capture the Threats? We created this game so players can further sharpen their skills in exploring the darker corners of the cyber world to stop malicious actors.  The game includes four categories: credential leaks, illicit markets (dark web and social media), open web (GitHub, ... Read More
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Intelligence Feeds: 9 Valuable Sources of CTI." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat Intelligence Feeds: 9 Valuable Sources of CTI

| | Blog
Among the many available sources of cyber threat intelligence (CTI), threat intelligence feeds are incredibly valuable for staying informed about the latest threats and potential indicators about those threats. Whether observed in the wild and reported by real users or gathered by decoy systems that lure attackers in, threat intel ... Read More
Screenshot of the Russian Market stealer logs page, which is on a dark navy background. There are multiple search options at the top of the homescreen with a number of listings below it from different countries.

Threat Spotlight: Top Illicit Sources to Monitor in 2023

| | Blog, Threat Spotlight
Executive Overview The top illicit communities to monitor this year are a mix of dark web forums, markets/autoshops, and illicit communities across the instant messaging app Telegram. Most of them had previously existed, and are more recently gaining traction.  A comprehensive cyber threat intelligence strategy includes following a wide range ... Read More

Operational Threat Intelligence: The Definitive Guide

| | Blog
Cyber threat intelligence involves gathering and analyzing an assortment of disparate data to help make prompt and effective security decisions related to current or potential attacks and adversaries. But simply lumping all of this information under a general label like “cyber threat intelligence” ignores the fact that there are different ... Read More
The homepage of the TOR browser has a dark navy-black background with a graphic in the middle of a megaphone with the text “Resistance Change Freedom” next to it.

Data Breach Prevention: Identifying Leaked Credentials on the Dark Web

| | Blog
Threat actors deploy many tactics, techniques and procedures (TTPs) to get access to sensitive data assets. Among this arsenal of weapons, obtaining correct user credentials (username and password pairs) that can be used for credential stuffing attacks plays a central role in most data breaches.  Poor password hygiene makes some credentials ... Read More
The Threat Intelligence Lifecycle is represented in a circle with the six phases labeled clockwise from the top. The background is navy and there are blue icons next to each of the six phases: Phase 1 Scoping Threat Intelligence Requirements, Phase 2 Threat Intelligence Collection, Phase 3 Threat Intelligence Processing, Phase 4 Threat Intelligence Analysis, Phase 5 Threat Intelligence Dissemination, and Phase 6 Feedback.

The Threat Intelligence Lifecycle: A Definitive Guide for 2023

| | Blog
Building an effective threat intelligence program that disseminates actionable data that results in real-world risk reduction has never been more critical than in 2023. Threats to enterprise organizations ranging from geopolitical risk to sophisticated ransomware groups continue to proliferate while many security teams struggle to integrate dozens of tools together ... Read More

Threat Intelligence in 2023: The Definitive Guide

| | Blog
Threat Intelligence provides organizations with timely, relevant information about threats to their business. Threat intelligence can come in many different forms and includes four primary layers, strategic threat intelligence, tactical threat intelligence, operational threat intelligence, and technical threat intelligence. Organizations with mature threat intelligence functions in place are able to ... Read More
White text “Flare’s Dark Web Monitoring Reduces Leading Bank’s Threat Identification Time to Minutes” over a gradient lighter and darker blue background.

Flare’s Dark Web Monitoring Reduces Leading Bank’s Threat Identification Time to Minutes

| | Blog, Success Stories
Overview How can a CTI team thoroughly and quickly monitor the billions of leaked credentials on the dark web? The CTI team of a major North American bank had difficulty with three main pain points: 1) prevent day-to-day cyber fraud, 2) gain better insight into critical threats, and 3) immediately ... Read More
Flare AI Expert Olivier Michaud and CTO Mathieu Lavoie at BSides Ottawa presenting the talk as they stand on a stage with a screen to the right of them.

Top 5 Most Asked Questions at BSides

| | Blog
This year, the Flare team had many opportunities to attend BSides conferences across Canada and the U.S. It was a special experience to join local BSides conferences as well as travel to cities and visit cybersecurity communities. BSides conferences mean a lot to us at Flare because hosting affordable, local ... Read More
White text "Day 1 Russian Market"​ with a screenshot of the Russian Market homepage over a navy background.

Threat Spotlight: 12 Days of Threats

| | Blog, Threat Spotlight
Executive Summary 1. Russian Market (Infected Devices & the Growing Threat of Stealer Malware) Infected device markets sell access to infected computers and browser fingerprints that can be used by threat actors to compromise online accounts. Like identity theft, the infected device can reveal a wealth of personal information about ... Read More