
The History and Evolution of Ransomware Attacks
It’s imperative for all organizations to have a plan for how to prevent and respond to ransomware attacks. But in order to understand how to prepare today, it’s also necessary to understand how ransomware has evolved to reach its current state. The post The History and Evolution of Ransomware Attacks ... Read More

What is E-Skimming? Detecting and Defending Against Digital Fraud
While attacks targeting ATMs have been around for virtually as long as the ATMs themselves, security awareness and the advances in technology have led to an evolution of these attacks from being predominantly physical to increasingly digital in nature. The post What is E-Skimming? Detecting and Defending Against Digital Fraud ... Read More

What is E-Skimming? Detecting and Defending Against Digital Fraud
While attacks targeting ATMs have been around for virtually as long as the ATMs themselves, security awareness and the advances in technology have led to an evolution of these attacks from being predominantly physical to increasingly digital in nature. The post What is E-Skimming? Detecting and Defending Against Digital Fraud ... Read More

The Pyramid of Pain and Cyber Threat Intelligence
In order to help teams objectively assess the effectiveness of their threat intelligence program and identify ways to improve, David Bianco, a cybersecurity and threat hunting expert, created the Pyramid of Pain in 2013. The post The Pyramid of Pain and Cyber Threat Intelligence appeared first on Flashpoint ... Read More

Top 5 Cyber Threats to the Healthcare and Public Health Sector in 2022
It’s crucial for organizations in the healthcare and public health sector to gain an awareness of their risk apertures and implement the right threat intelligence tools that enable them to quickly identify, mitigate, and prevent cyber attacks. The post Top 5 Cyber Threats to the Healthcare and Public Health Sector ... Read More

Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape 
Attacks on ATMs and other physical payment-related devices, like point-of-sale (POS) terminals, have long been leveraged by threat actors as a way to steal victims’ personal information either to sell or to use fraudulently. The post Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape ... Read More

Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape 
Attacks on ATMs and other physical payment-related devices, like point-of-sale (POS) terminals, have long been leveraged by threat actors as a way to steal victims’ personal information either to sell or to use fraudulently. The post Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape ... Read More

FUSE 2022: Highlights From Flashpoint’s 6th Annual User Conference
Last week, we welcomed hundreds of our customers to FUSE, Flashpoint’s 6th annual user conference. The post FUSE 2022: Highlights From Flashpoint’s 6th Annual User Conference appeared first on Flashpoint ... Read More

Insider Threats: Recruitment Tactics and TTPs You Should Prepare For
Insider threats on the rise The tactic of recruiting insiders has been gaining popularity among threat actors aiming to breach systems and/or commit ransomware attacks. According to Flashpoint data collections, there were 3,988 unique discussions about insider-related threats observed in our datasets between January 1 and November 30, 2021—a number that ... Read More

Flashpoint Ransomware Dashboard: Helping CTI and SOC Teams Better Defend Against Ransomware Attacks
Ransomware attacks are on the rise A quick scan of the news headlines tells us that ransomware events have become a frequent occurrence. It goes without saying then that ransomware attacks are top-of-mind for Cyber Threat Intelligence (CTI) and security teams, as threat actors continue to evolve, adjust, and scale ... Read More