Dark blue background with the Leaky Weekly logo on the left side in a circle. To the right is a green oval with "Podcast" inside. Below it is the text in white: "Background Check Organization Breach, A Repossessed Ransomware Blog, Feuding Forums, and the Double Arrest of "J.P. Morgan"

Cybercrime Current Events: Background Check Organization Breach, a Repossessed Ransomware Blog, Feuding Forums, and Double Arrest of “J.P. Morgan”

| | Blog, Dark Web Insider
There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the most pressing stories on data leaks, cybercrime, and the dark web in the last week or so. On ... Read More
Leaky Weekly Pilot: Stealer Logs, Hacktivists, and Unauthorized Access

Launching Leaky Weekly with Flare, Cybercrime Current Events Podcast

| | Blog, Dark Web Insider
There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the most pressing stories on data leaks, cybercrime, and the dark web in the last week or so. Tune ... Read More
Navy background on the left side with the copy in ShapeUp at Flare: A GameChanger for Project Management." On the right is a lighter blue background and graphic of a person's hand pointing at a board and another set of hands holding a tablet.

ShapeUp at Flare: A Game-Changer for Project Management

| | Blog
By Benoit Doyon, Software Development Team Lead I first encountered ShapeUp during one of my initial interviews for a position at Flare. My soon-to-be manager mentioned, “We’re using a methodology that works well for us, but you might not have heard of it before.” With over 10 years of software ... Read More
Red Teaming the Modern Attack Landscape

Red Teaming the Modern Attack Landscape

| | Blog, CTI Strategies
In today’s expanded attack surface, new technologies create new opportunities for businesses and malicious actors. Attackers can use the same artificial intelligence (AI) and large language models (LLMs) that companies use, often in the same way. In both cases, these technologies reduce the time spent on repetitive, manual tasks. For ... Read More
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Using CTI to Help Predict Vulnerability" with a light orange arrow pointing down.

Using CTI to Help Predict Vulnerability Exploitability

| | Blog, CTI Strategies
In a world of increasingly powerful data analytics, security researchers continue to develop new uses for artificial intelligence (AI) and machine learning (ML). In security, predictive analytics offer insight into how a company should prioritize its activities. With more vulnerabilities detected daily, vulnerability management teams become overwhelmed, unable to patch ... Read More
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "AlphaLock, Threat Actor Branding, and the World of Cybercrime Marketing" with a light orange arrow pointing down.

AlphaLock, Threat Actor Branding, and the World of Cybercrime Marketing

| | Blog, Resource Center
Threat actors are not a monolith in their approach to cybercrime. The popular perception is that threat actors steal information for the sake of it, while knowing and accepting that they are doing something wrong. However, some threat actors also justify their actions by promoting an image that their activity ... Read More
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Ransomware in Context: 2024, A Year of Tumultuous Change" with a light orange arrow pointing down.

Ransomware in Context: 2024, A Year of Tumultuous Change

| | Blog, Dark Web Insider
2024 has started off dramatic shifts in the ransomware landscape. In December of 2023 international law enforcement took down the BlackCat leaks site, leading to the group removing all ethical restrictions for their affiliates and declaring all organizations in Western Europe and the United States viable targets to include nuclear ... Read More
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "LockBit's Conversation on XSS Forum with an Initial Access Broker" with a light orange arrow pointing down.

LockBit’s Conversation on XSS Forum with an Initial Access Broker

In February of 2024, admins of the Russian hacking forum XSS banned the primary LockBit account active on the forum. The ban was the result of a dispute between LockBit, and an initial access broker operating under the username “aa.”  The following is a conversation between AA and LockBit, posted ... Read More
A navy background with the white text "Data Extortion Ransomware Threats"

Threat Spotlight: Data Extortion Ransomware Threats

Over the last few years, the ransomware landscape has changed significantly. Between 2022 and 2023, ransomware attacks increased by more than 100% year-over-year, with more attacks consisting of double and triple extortion. At a high level, the categories of ransomware can be defined as: Modern ransomware attacks are no longer ... Read More
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Initial Access Broker Landscape in NATO Member States on Exploit Forum." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Initial Access Broker Landscape in NATO Member States on Exploit Forum

| | Blog, Dark Web Insider, Resource Center
Initial access brokers (IABs) gain unauthorized access to the system then sell this access to other malicious actors. Based on a large sample of IAB posts on the Russian-language hacking forum Exploit.in (Exploit), IABs increasingly target entities within NATO member states, with research revealing recent activity in 21 of 31 ... Read More
Loading...

Application Security Check Up