Risk

9/10/2018
11:25 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Research Firm Names Flashpoint a Strong Performer Citing Custom Collection Strategies, Cybercrime Analysis

NEW YORK, Sept. 10, 2018 (GLOBE NEWSWIRE) -- Flashpoint, the global leader in Business Risk Intelligence (BRI), today announced its inclusion among the top emerging threat intelligence companies in “The Forrester New Wave™: External Threat Intelligence Services, Q3 2018” report.
For this report, Forrester Research evaluated the 15 most significant companies in the market and rated them against 10 criteria and where they stand in relation to each other. Flashpoint was rated a “Strong Performer,” with the report giving it a differentiated rating in dark web intelligence, threat feeds, cybercriminal and financial crime focus, as well as vision and execution criteria.
According to the report, Flashpoint “is the best fit for companies requiring finished intelligence reporting on business risk...it will develop custom collection strategies, even deploying custom infrastructure, to meet customer intelligence requirements.”1 The report also states that, in general, “vendor collection strategies are the biggest differentiator in the market.”
Finally, in assessing surface web and dark web intelligence, Forrester noted that the criteria were highly differentiated, writing: “Someone saying something on the dark web doesn’t make it true. Anyone with a TOR browser can access the dark web and visit markets to see all manner of items and services for sale. In these ‘open’ marketplaces, you have to assume a lot of the most sordid material is either grifting or law enforcement (read: low confidence). To obtain higher confidence intelligence, you need to access private forums.”
“Meaningful intelligence is about the right data at the right time with the right context and needs to come from high-quality sources,” said Josh Lefkowitz, CEO and co-founder, Flashpoint. “We believe Flashpoint’s rating as a ‘Strong Performer’ in this report is a testament to our team’s hard work and ability to deliver the best synthesis of raw data into finished intelligence, as well as a testament to our subject matter experts who deftly access elite and private online criminal communities and use their expertise and insights to inform collections and intelligence production.”
Access a free copy of The Forrester New Wave™: External Threat Intelligence Services, Q3 2018.
______________________
1 The Forrester New Wave™: External Threat Intelligence Services, Q3 2018, Forrester Research, Inc., September 7, 2018

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19406
PUBLISHED: 2018-11-21
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
CVE-2018-19407
PUBLISHED: 2018-11-21
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
CVE-2018-19404
PUBLISHED: 2018-11-21
In YXcms 1.4.7, protected/apps/appmanage/controller/indexController.php allow remote authenticated Administrators to execute any PHP code by creating a ZIP archive containing a config.php file, hosting the .zip file at an external URL, and visiting index.php?r=appmanage/index/onlineinstall&url= ...
CVE-2018-19387
PUBLISHED: 2018-11-20
format_cb_pane_tabs in format.c in tmux 2.7 through 2.8 might allow attackers to cause a denial of service (NULL Pointer Dereference and application crash) by arranging for a malloc failure.
CVE-2018-19388
PUBLISHED: 2018-11-20
FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read, access violation, and application crash) via TIFF data because of a ConvertToPDF_x86!ReleaseFXURLToHtml issue.