The History and Evolution of Ransomware Attacks

The History and Evolution of Ransomware Attacks

It’s imperative for all organizations to have a plan for how to prevent and respond to ransomware attacks. But in order to understand how to prepare today, it’s also necessary to understand how ransomware has evolved to reach its current state. The post The History and Evolution of Ransomware Attacks ... Read More
What is E-Skimming? Detecting and Defending Against Digital Fraud

What is E-Skimming? Detecting and Defending Against Digital Fraud

While attacks targeting ATMs have been around for virtually as long as the ATMs themselves, security awareness and the advances in technology have led to an evolution of these attacks from being predominantly physical to increasingly digital in nature. The post What is E-Skimming? Detecting and Defending Against Digital Fraud ... Read More
What is E-Skimming? Detecting and Defending Against Digital Fraud

What is E-Skimming? Detecting and Defending Against Digital Fraud

While attacks targeting ATMs have been around for virtually as long as the ATMs themselves, security awareness and the advances in technology have led to an evolution of these attacks from being predominantly physical to increasingly digital in nature. The post What is E-Skimming? Detecting and Defending Against Digital Fraud ... Read More
The Pyramid of Pain and Cyber Threat Intelligence

The Pyramid of Pain and Cyber Threat Intelligence

In order to help teams objectively assess the effectiveness of their threat intelligence program and identify ways to improve, David Bianco, a cybersecurity and threat hunting expert, created the Pyramid of Pain in 2013.  The post The Pyramid of Pain and Cyber Threat Intelligence appeared first on Flashpoint ... Read More
Top 5 Cyber Threats to the Healthcare and Public Health Sector in 2022

Top 5 Cyber Threats to the Healthcare and Public Health Sector in 2022

It’s crucial for organizations in the healthcare and public health sector to gain an awareness of their risk apertures and implement the right threat intelligence tools that enable them to quickly identify, mitigate, and prevent cyber attacks. The post Top 5 Cyber Threats to the Healthcare and Public Health Sector ... Read More
Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape 

Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape 

Attacks on ATMs and other physical payment-related devices, like point-of-sale (POS) terminals, have long been leveraged by threat actors as a way to steal victims’ personal information either to sell or to use fraudulently. The post Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape ... Read More
Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape 

Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape 

Attacks on ATMs and other physical payment-related devices, like point-of-sale (POS) terminals, have long been leveraged by threat actors as a way to steal victims’ personal information either to sell or to use fraudulently. The post Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape ... Read More
FUSE 2022: Highlights From Flashpoint’s 6th Annual User Conference

FUSE 2022: Highlights From Flashpoint’s 6th Annual User Conference

Last week, we welcomed hundreds of our customers to FUSE, Flashpoint’s 6th annual user conference. The post FUSE 2022: Highlights From Flashpoint’s 6th Annual User Conference appeared first on Flashpoint ... Read More
Insider Threats: Recruitment Tactics and TTPs You Should Prepare For

Insider Threats: Recruitment Tactics and TTPs You Should Prepare For

Insider threats on the rise The tactic of recruiting insiders has been gaining popularity among threat actors aiming to breach systems and/or commit ransomware attacks. According to Flashpoint data collections, there were 3,988 unique discussions about insider-related threats observed in our datasets between January 1 and November 30, 2021—a number that ... Read More
Flashpoint Ransomware Dashboard: Helping CTI and SOC Teams Better Defend Against Ransomware Attacks

Flashpoint Ransomware Dashboard: Helping CTI and SOC Teams Better Defend Against Ransomware Attacks

Ransomware attacks are on the rise A quick scan of the news headlines tells us that ransomware events have become a frequent occurrence. It goes without saying then that ransomware attacks are top-of-mind for Cyber Threat Intelligence (CTI) and security teams, as threat actors continue to evolve, adjust, and scale ... Read More
Loading...

Secure Guardrails