Make More Intelligent Decisions
With Business Risk Intelligence

Subject matter expertise fused with innovative technology illuminates
risk blind spots and delivers truly finished intelligence.

Flashpoint Intelligence Platform

 


Enterprises need to protect their ability to operate, and to do that they must make better, more informed risk decisions. They need a solution that can give them immediate visibility into real threats with the potential to harm them, and the context to help them understand how these threats could impact their business.

The Flashpoint Intelligence Platform grants access to our expansive archive of intelligence reports and Deep & Dark Web Forum data in a single, finished intelligence experience. Using our visibility into the Deep & Dark Web and our scalable finished intelligence products, users in enterprises of all sizes and maturities, and across business functions and use cases, can improve their decision making abilities.

Whether you are an intel expert or new to BRI, our platform delivers relevant intelligence that empowers you to make more informed decisions and to mitigate risk in any part of your organization.

Customizable BRI Dashboard

Our “onboarding wizard” allows for quick customization to industry, region, category, and threat target access. It’s a finished intelligence experience to help organizations make more informed decisions.

Intelligence-to-Data Pivoting

Browse or query reports then click directly into a sanitized copy of the original threat actor conversation. Assess emerging threats, vulnerabilities, and potential impacts to accurately and make effective risk decisions.

Tagging & Content Classification

The Flashpoint Intelligence Platform features optimized intelligence and report tagging and classification that improves report searching and discovery. Users can simply investigate BRI reports, including cybercrime intelligence, physical threat intelligence, and sanitized searching of the Deep & Dark Web, and easily gain a deep contextual understanding of the threats that matter to them the most.

Our transition to Flashpoint Intelligence Platform 3.0 was seamless. In this finished intelligence product, what differentiates Flashpoint is its ability to pivot from reports directly into the actor conversation and take the story 10 times deeper. We can see more about what we care about, such as conversations about us, our clients, other companies; you get to the raw intelligence itself, which no one else lets you do.

Threat Analyst

Large Financial Institution


Learn More
Our Analysts
sol_sectionicon_subjectmatter
At Flashpoint, our analysts are critical to creating a finished intelligence experience for our users. Our analysts are tradecraft experts who have honed their skills over years of operating in the most austere online environments and training in elite government and corporate environments. Already embedded in these communities for years with redundant layers of access, they have an intimate understanding of cultures and communities and speak more than a dozen languages with a textured understanding of vernacular and slang. They leverage this experience to train Deep & Dark Web collection and analytics engines to generate intelligence for stakeholders across the enterprise, providing customers and partners with its unmatched Business Risk Intelligence.
Team Member Profiles
Advisory Services
sol_sectionicon_report

Business Risk Intelligence Practice

Tailored solutions to those organizations starting, rebuilding, or expanding an intelligence function whether for a single function or to support risk broadly across the business. Flashpoint can design and deliver engagements ranging from a single-day workshop to month-long projects around establishing cross-functional intelligence fusion cells. Offerings include BRI Workshops, Intelligence Operations Training, Retained Advisory Services, and other product-based engagements.
sol_sectionicon_alerting

Strategic Engagement Services Practice

Whether an organization is looking to identify and assess risk to their company and executives proactively or to support an ongoing incident or investigation, Flashpoint’s deep experience, expertise, and intelligence capabilities are ready to assist. Offerings include Rapid Risk Response, Deep & Dark Web Risk / Executive Risk Exposure Reports, Directed Actor Engagement, and additional Flashpoint analyst service hours.
Our team has rich experience in building intelligence operations at organizations such as HP, Bank of America, PNC, Fidelity National Information Services, and Deloitte, and we can now provide this expertise directly to you.

We’ve been a Flashpoint customer for a year, after we told our CISO that having its Business Risk Intelligence was a “must-have” and not optional. As a newly formed threat intelligence team, Flashpoint gave us the visibility we needed to focus on what we needed to do, and how to better our own threat intel capabilities. New customer onboarding was also thorough and well-informed, and empowered us to get up and running very quickly.

Network Security Engineer

Financial Services Institution


Use Cases
 

One Strategy, Multiple Use Cases

Deep & Dark Web Data Fuels BRI Products and Solutions

 

 

 

solution_whiteicon_cybersecurity

Cybersecurity & emergent malware

Background: Malware developers continually adapt their malware to bypass detection and controls. These new malware strains are often developed by actors operating in the Deep & Dark Web and then released into the wild without forewarning, leaving companies flat-footed and reactive.

Flashpoint’s Approach: Because Flashpoint’s Subject Matter Experts are embedded in illicit Deep & Dark Web communities, we are able to gain insights into malware development as it happens and facilitate a proactive approach to mitigation.
Use Case: In one instance, Flashpoint analysts embedded within a criminal underground community obtained an early version of unreleased point-of-sale (POS) malware yet to be deployed in the wild.

Outcome: Through coordination with various antivirus companies, information about the POS malware was quietly released in a manner that was timed and controlled — with the intent to not only prevent harm, but to prevent the malware’s author and POS customers from reacting.
solution_whiteicon_physicalsecurity

Physical Security & Executive Protection

Background: As the overlap between the cyber and physical threat landscapes expands, threat actors continue active in illicit online communities pose serious risks to organizations’ physical security. But, as most enterprise physical security teams lack visibility into the cyber threat landscape and vice versa, organizations often are not fully aware of relevant physical threats.

Flashpoint’s Approach: In addition to extensive experience engaging with threat actors on the Deep & Dark Web, many of Flashpoint’s Subject Matter Experts have closely honed their physical security skills during time served in the US military and/or with public-sector intelligence agencies. When combined with targeted Deep & Dark Web monitoring, Flashpoint’s expertise helps organizations proactively identify and mitigate physical security risks.
Use Case: When a high-profile executive from a Fortune 100 company planned to attend a popular public event, the company’s physical security teams used Flashpoint’s Business Risk Intelligence to identify and investigate previously-unknown threat actors located in the vicinity of the event.  

Outcome: This visibility enabled security teams to leverage a threat-based approach by deploying resources in priority areas to protect their executive and reduce risks to physical security.
solution_whiteicon_thirdparty

Third-Party Vendor Risk/incident response

Background: While organizations are often focused on their own security policies and procedures, they also need to have similar awareness of the risk posed by their vendors, customers, and partners — many of whom can have access to sensitive systems and data.

Flashpoint’s Approach: Flashpoint’s expansive coverage of the Deep & Dark Web provides a robust view into a company’s ecosystem and helps rapidly assess the risks posed by third party relationships.
Use Case: A Fortune 50 customer was indirectly hacked through one of their international clients, resulting in the exfiltration of sensitive customer information. Utilizing Flashpoint’s data, the company was able to obtain information from the underground criminal forum where the customer information was released.

Outcome: In addition to confirming the existence of this data, the company further learned that the leak was much greater in scale than initially thought, totaling over 90 million U.S. records pertaining to hospital patients. Flashpoint analysts assisted the company in obtaining a sample set of the data and worked with the customer to help limit further exposure.
solution_whiteicon_fraud

Fraud

Background: Fraud is one of the most persistent threats across the enterprise that is not easily detectable with purely technical indicators. Ranging from social engineering and insider trading to phishing, credential harvesting, and identity theft, threat actors are constantly developing new exploits for financial gain. Combatting fraud often presents challenges stemming from detection difficulties, language barriers, technical complexities, and lack of visibility into the Deep & Dark Web.

Flashpoint’s Approach: Flashpoint’s multilingual Subject Matter Experts have spent years immersed in the Deep & Dark Web analyzing fraud across various illicit communities that often have complex techniques, tactics, and procedures (TTPs) to engage in fraud. This combination of in-depth expertise with these TTPs and robust intelligence equips organizations with the context and visibility necessary to proactively mitigate even the most complex fraud schemes.  
Use Case: Flashpoint uncovered a plot to exploit the upcoming US implementation of Europay MasterCard Visa (EMV). Deep & Dark Web intelligence revealed that threat actors had developed specific EMV-chip recording software and manufacturing techniques to fabricate chip-enabled credit cards.  

Outcome: Flashpoint’s financial industry customers used this information to get ahead of the threat prior to the US-launch of EMV, enabling them to engage in intelligence-led anti-fraud implementations and tailored go-to-market strategies in order to mitigate the financial loss and damaged brand reputation associated with large-scale fraud.
solution_whiteicon_insider

Insider threat

Background: Insider threats arise when rogue employees exploit access to their organization’s sensitive internal information for personal or political gain. While enterprise security teams often focus on mitigating external attacks, many organizations lack visibility into the potential threat of insiders secretly profiting off of confidential corporate knowledge or intellectual property. Likewise, others may desire to engage in violent political action that can harm both the company’s physical property and reputation.

Flashpoint’s Approach: Flashpoint combines an intimate familiarity with malicious insiders’ techniques, tactics, and procedures (TTPs) with targeted monitoring of the Deep & Dark Web to help organizations proactively mitigate insider threats.
Use Case: Flashpoint’s intelligence from an underground forum revealed that a rogue employee of a multinational technology company was preparing to profit from stolen source code from unreleased, enterprise-level software.    

Outcome: Flashpoint immediately alerted the company and helped them complete an internal investigation, work with law enforcement to support the employee’s arrest, prevent the illicit sale, and preserve the company’s intellectual property.