sb-au logo
Story image

Flashpoint announces new features on intelligence platform

26 Apr 2019

Business Risk Intelligence (BRI) company Flashpoint has announced new features that help teams bolster cybersecurity, confront fraud, detect insider threats, enhance corporate and physical security, and address third-party risk.

The new features strengthen Flashpoint’s Intelligence Platform, which grants access to the company’s archive of finished intelligence reports, data from illicit forums, marketplaces, chat services, paste sites, technical data, card and account shops, and vulnerabilities, in a finished intelligence experience.

The platform scales Flashpoint’s internal team of intelligence analysts’ ability to quickly provide responses to customers.

The platform now features new dashboards and analytics, expanded datasets, chat services and communities, and industry alerting that simplify an organisation’s consumption and automation of intelligence.

The enhancements include:

Account Shops: Customers can identify their organisation's compromised accounts found for sale in illicit account shops, providing an ability to reduce the risk of employees’ or customers' login details being used in credential stuffing attacks.

Card Shops: Collections of stolen credit card data found in illicit high-end credit card shops, compromised from a variety of operations — including dumps from point-of-sale (POS) compromises, or credit cards from card-not-present (CNP) transactions.

Common Vulnerabilities and Exposures (CVEs): Prioritise the vulnerabilities that matter most with access to the latest CVEs, as well as CVEs discussed by threat actors as observed by Flashpoint intelligence analysts with incorporated access to MITRE ATT&CK and NVD data.

Dashboards: Comprehensive view of data measured against Flashpoint collections, most relevant to an organisation; from monitoring the latest credit card leaks, to keeping track of the most active CVEs, our dashboards provide a view into information and data to help better mitigate vulnerability exposure and risk to your organisation.

Expanded Chat Services: Flashpoint’s Telegram collections now allow customers to view critical media included in chat services messages, such as audio, images, documents, and other file types, including malware samples and technical data, providing more context to chat conversations and additional intelligence for research purposes. Collections are also expanding to include illicit discussions and media on multiple chat services.

Expanded Communities: Flashpoint is expanding its coverage of illicit discussions in communities such as 4Chan, 8Chan, and Dread, providing users with additional context as to how threats move across the web.

Industry Alerting: Based on multi-language keyword patterns developed, curated, and maintained by our Intelligence team, this product provides customers tactical information derived from threat actor conversations that are relevant to users in their respective industries and industries they want to monitor. In addition to Flashpoint’s tailored industry alerting for financial services, retail, legal and healthcare, the company has added patterns that find signal in the noise for users who are in, or care about, the technology, insurance, and telecommunications industries.

"We've listened to the Flashpoint community and really focused on creating features and capabilities that help address our customers' most important use cases," says Flashpoint CEO Josh Lefkowitz.

"As a result, we've expanded our data collections, refined our intelligence, and delivered analytics in ways that help our users detect, understand, and mitigate the threats they face without overwhelming them with noise.”

Flashpoint’s continued innovation around collections also supports its Flashpoint Collaboration (FPCollab), a TLP Amber information sharing community comprised exclusively of leading intelligence experts across 20 industries.

“When a proof-of-concept (PoC) code for a high-impact vulnerability was released, one of our analysts immediately notified FPCollab, sparking a discussion in which members reciprocated by providing their own PoC code or recommended mitigations,” Lefkowitz says.

“FPCollab members then synergised to fine tune the PoC code, better understand how the vulnerability could be exploited, mitigate the risk it posed to their network environments, and build upon each other’s findings.”

Link image
Webinar: Best practices for managing disparate security solutions
As budgets get more constrained, the emphasis shifts from merely finding threats to increased efficiency in managing security operations. Learn how to juggle a crowded field of solutions.More
Link image
Webcast series: The necessary tools to secure a remote workforce
Experts from across the A/NZ region discuss the best security practices in a remote working world - with sessions available on the first Thursday of every month.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
Proofpoint enhances security awareness training platform
Available in Q4 2020, the platform will integrate more closely with Proofpoint’s best-in-class threat intelligence.More
Story image
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More