Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums

Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums

The legacy of Raid, Breach, and their 'successors' provides an important lens into how data breach communities function and the real-life implications of the information they traffic The post Lost in Transition: ...
Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism

Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism

Social media and messaging platforms like Telegram continue to play a key role in understanding events, rumors, and ideas as they unfold in the Russia-Ukraine war The post <strong>Days of Chaos: How ...
Unmasking Anonymous Sudan: Timeline of DDoS Attacks, Affiliations, and Motivations

Unmasking Anonymous Sudan: Timeline of DDoS Attacks, Affiliations, and Motivations

Blogs Blog Unmasking Anonymous Sudan: Timeline of DDoS Attacks, Affiliations, and Motivations A running timeline of Anonymous Sudan’s DDoS attacks on countries, industries, companies, and governmental entities around the world, including Microsoft, ...
Crypto, Cash-outs, and Closures: Surveying the Darknet Ecosystem in the Wake of Hydra Market

Crypto, Cash-outs, and Closures: Surveying the Darknet Ecosystem in the Wake of Hydra Market

On the one-year anniversary of Hydra's seizure, Flashpoint explores how threat actors have adapted to fill the market's void and fuel their illicit aims—from narcotics transactions to money laundering. The post Crypto, ...
Physical Threat Assessment: What to Know About the 2022 Qatar World Cup

Physical Threat Assessment: What to Know About the 2022 Qatar World Cup

From accusations of human rights abuses and corruption to negative reactions from religious extremists, the 2022 World Cup in Qatar has been no stranger to controversy. The post Physical Threat Assessment: What ...
Why Telegram Is Essential to Open Source Investigations

Why Telegram Is Essential to Open Source Investigations

Telegram has become an increasingly popular—and often essential—source of information that can be used for open-source investigations and uncover a variety of cyber and physical threats that organizations in the public and ...
WATCH LIVE: 20th Communist party congress

Xi’s Rules: Key Takeaways From China’s National Party Congress

During the Chinese Communist Party’s 20th National Party Congress, a crucial political event that occurs only once every five years, two themes emerged: consolidation of power and unification with Taiwan. The post ...
Defense and damage: The Iranian UAVs Strengthening Russia’s Invasion of Ukraine

Defense and damage: The Iranian UAVs Strengthening Russia’s Invasion of Ukraine

Although Iran initially took a public position of neutrality in the Russia-Ukraine war, it is now supplying UAVs to Russia, which boasts one of the largest and most technologically advanced uncrewed aerial ...
What We Know About the Zero-Day Vulnerability Affecting Zimbra Collaboration and cpio

What We Know About the Zero-Day Vulnerability Affecting Zimbra Collaboration and cpio

On September 10, an attack was reported in the Zimbra forums where a malicious actor was able to upload a JSP web shell into the /public directory to execute a command, generating ...
How Russians Are Reacting to Putin’s Conscription Gamble

How Russians Are Reacting to Putin’s Conscription Gamble

Real-time data from Russian social media platforms and related illicit communities is vital to understanding the domestic public response to Putin’s military mobilization declaration—a significant risk from Russia’s leader. The post How ...