Written By:
Flashpoint Intel Team

Flashpoint's Intel Team comprises experts with deep intel and security experience across military, federal, government agencies and Fortune 500s, as well as backgrounds in malware analysis, compliance, economic policy, risk, and counterterrorism, among other specialized areas.

Cyber Threat Intelligence
Part 2: Vulnerability Insights and Prioritization Report 2025 H1 Analysis
The last part of this series reveals what happened in the vulnerability landscape in the first half of 2025.
Read post
Vulnerability Management
Part 1: Vulnerability Insights and Prioritization Report 2025 H1 Analysis
Part one of our two-part series explores why public sources like NVD and CVE fall short, the impact that has on ...
Read post
Featured
The Rising Threat of macOS Infostealers: What You Need to Know to Defend Against Them
The macOS infostealer ecosystem is growing in popularity and sophistication. In this post, Flashpoint analysts ...
Read post
Vulnerability Management
Flashpoint Weekly Vulnerability Insights and Prioritization Report
Anticipate, contextualize, and prioritize vulnerabilities to effectively address threats to your organization.
Read post
Cyber Threat Intelligence
Escalation in the Middle East: Tracking the Israel–Iran Conflict Across Military and Cyber Domains
This post explores the convergence of physical warfare and cyber operations in the escalating confrontation ...
Read post
Corporate & Physical Security
The CEO Database Exposes Information on Over 1,000 Executives
In this post, we delve into the emergence of The CEO Database, analyzing the escalated threat it poses to ...
Read post
Cyber Threat Intelligence
Inside the LockBit Leak: Rare Insights Into Their Operations
In this post, we delve into the significant data breach affecting the LockBit ransomware group. This leak ...
Read post
Cyber Threat Intelligence
Flashpoint Investigation: Uncovering the DPRK’s Remote IT Worker Fraud Scheme
In this post, we dive into Flashpoints investigation of a multi-million dollar North Korean remote IT worker ...
Read post
Cyber Threat Intelligence
The Top Threat Actor Groups Targeting the Financial Sector
In this post, we identify and analyze the top threat actors that have been actively targeting the financial ...
Read post
Cyber Threat Intelligence
The Top Ransomware Groups Targeting the Healthcare Sector
In this post, we identify and analyze the top ransomware groups that have been actively targeting the healthcare ...
Read post
Cyber Threat Intelligence
AgeoStealer: How Social Engineering Targets Gamers
In this post, we explore AgeoStealer, an evolving threat disguised as a video game, used by cybercriminals to ...
Read post
Cyber Threat Intelligence
The Four Steps of Tax Refund Fraud: What You Need to Know
In this post we explore 2025’s most prevalent tax fraud schemes, detailing threat actor methods of obtaining ...
Read post