Why We Built Flashpoint Ignite: Unity, Power, and Performance
Flashpoint has long been known for its industry-leading data collection and finished intelligence. After two major acquisitions in 2022, we have powerful far-reaching visibility with…
Flashpoint has long been known for its industry-leading data collection and finished intelligence. After two major acquisitions in 2022, we have powerful far-reaching visibility with…
Hypervisors are the backbone of modern virtualized environments, but when compromised, they can become a force multiplier for attackers. A single breach at this layer…
Russian state-sponsored hackers have been linked to an ongoing Signal and WhatsApp phishing campaign targeting government officials, military personnel, and journalists to gain access to sensitive…
A red teamer operating under the handle OtterHacker has publicly released M365Pwned, a pair of WinForms GUI tools designed to enumerate, search, and exfiltrate data…
If you have been using Signal or WhatsApp for work, you might want to double-check your security settings. On Monday, 9 March 2026, the Netherlands’…
Anthropic has filed a lawsuit to block the Pentagon from placing it on a national security blacklist, escalating the artificial intelligence lab’s high-stakes battle with…
Security awareness training (SAT) is supposed to make companies safer, but too often, it feels like just another box to check. While every SAT vendor…
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece…
Microsoft has introduced Copilot Cowork, a new AI-powered feature embedded within Microsoft 365 that moves beyond conversational assistance to autonomous task execution. Unlike traditional Copilot…
Russian-backed hackers have launched a global cyber campaign to gain access to Signal and WhatsApp accounts used by officials, military personnel and journalists, two intelligence…
Download the full report The 2026 State of Security report provides comprehensive analysis of each threat domain, threat actor profiles, regional risk assessments, and actionable…
Acknowledgments: Special thanks to John Hammond for his contributions to this investigation and write-up. Update #2: 12/18/25 @ 6pm ET We’ve seen reports from other…