Insider Threats: Recruitment Tactics and TTPs You Should Prepare For

Insider Threats: Recruitment Tactics and TTPs You Should Prepare For

Insider threats on the rise The tactic of recruiting insiders has been gaining popularity among threat actors aiming to breach systems and/or commit ransomware attacks. According to Flashpoint data collections, there were 3,988 ...
Insider Threats: Recruitment Tactics and TTPs You Should Prepare For

Insider Threats: Recruitment Tactics and TTPs You Should Prepare For

The tactic of recruiting insiders has been gaining popularity among threat actors aiming to breach systems and/or commit ransomware attacks. Businesses must evolve their capability to identify, respond to, and mitigate insider threats, ...
Fraud and Credential Leakage Use Case

Fraud Case Management: What It Is, How It Works, & Why You Need It

As fraud becomes more complex– and unfortunately, more common – it’s no longer enough for your cyber fraud task force to simply gather details about a single case. They must be able ...
Fraud and Credential Leakage Use Case

Fraud Case Management: What It Is, How It Works, & Why You Need It

As fraud becomes more complex– and unfortunately, more common – it’s no longer enough for your cyber fraud task force to simply gather details about a single case. They must be able ...
Domain Squatting Use Case

Outside of the SOC: Use Cases not to Underestimate

When it comes to security, organizations are spread thin. Whether they have too much disjointed data or not enough SecOps staff, one of the biggest pain points is a lack of resources ...
Domain Squatting Use Case

Outside of the SOC: Use Cases not to Underestimate

When it comes to security, organizations are spread thin. Whether they have too much disjointed data or not enough SecOps staff, one of the biggest pain points is a lack of resources ...
Why Early Detection Matters in Phishing & Fraud Detection

Why Early Detection Matters in Phishing & Fraud Detection

IntroductionShashi and I started Bolster in 2017. Our first product was an AI-powered web-based phishing and fraud detection service. We complemented our detection engine with an automated takedown service. This way, we ...

Your Data, Their Gain: How Threat Actors Leverage Tax Season to Commit Fraud

In 2020, the IRS identified over US$2.3 billion in tax fraud schemes, including tax return fraud. And in 2021, we identified 113 breaches which resulted in more than 69 million exposed records, ...
Amazon Echos Hack Themselves, Fraud Is Flourishing on Zelle, Samsung Galaxy Source Code Stolen

Amazon Echos Hack Themselves, Fraud Is Flourishing on Zelle, Samsung Galaxy Source Code Stolen

A new attack uses Alexa’s functionality to force Amazon Echo devices to make self-issued commands, payment app Zelle has become popular with fraudsters and banks don’t seem to care, and details about ...
Funding and the Russia-Ukraine War: KYC for Crypto Transactions Proving Difficult

Funding and the Russia-Ukraine War: KYC for Crypto Transactions Proving Difficult

Click here for Flashpoint’s coverage of the role of intelligence in Russia’s war on Ukraine. Flashpoint analysts have uncovered 262 cryptocurrency addresses used in advertisements for donations to either Ukrainian or Russian causes related ...