11:25 AM
Dark Reading
Dark Reading
Products and Releases

Research Firm Names Flashpoint a Strong Performer Citing Custom Collection Strategies, Cybercrime Analysis

NEW YORK, Sept. 10, 2018 (GLOBE NEWSWIRE) -- Flashpoint, the global leader in Business Risk Intelligence (BRI), today announced its inclusion among the top emerging threat intelligence companies in “The Forrester New Wave™: External Threat Intelligence Services, Q3 2018” report.
For this report, Forrester Research evaluated the 15 most significant companies in the market and rated them against 10 criteria and where they stand in relation to each other. Flashpoint was rated a “Strong Performer,” with the report giving it a differentiated rating in dark web intelligence, threat feeds, cybercriminal and financial crime focus, as well as vision and execution criteria.
According to the report, Flashpoint “is the best fit for companies requiring finished intelligence reporting on business risk...it will develop custom collection strategies, even deploying custom infrastructure, to meet customer intelligence requirements.”1 The report also states that, in general, “vendor collection strategies are the biggest differentiator in the market.”
Finally, in assessing surface web and dark web intelligence, Forrester noted that the criteria were highly differentiated, writing: “Someone saying something on the dark web doesn’t make it true. Anyone with a TOR browser can access the dark web and visit markets to see all manner of items and services for sale. In these ‘open’ marketplaces, you have to assume a lot of the most sordid material is either grifting or law enforcement (read: low confidence). To obtain higher confidence intelligence, you need to access private forums.”
“Meaningful intelligence is about the right data at the right time with the right context and needs to come from high-quality sources,” said Josh Lefkowitz, CEO and co-founder, Flashpoint. “We believe Flashpoint’s rating as a ‘Strong Performer’ in this report is a testament to our team’s hard work and ability to deliver the best synthesis of raw data into finished intelligence, as well as a testament to our subject matter experts who deftly access elite and private online criminal communities and use their expertise and insights to inform collections and intelligence production.”
Access a free copy of The Forrester New Wave™: External Threat Intelligence Services, Q3 2018.
1 The Forrester New Wave™: External Threat Intelligence Services, Q3 2018, Forrester Research, Inc., September 7, 2018

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-02-19
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on ...
PUBLISHED: 2019-02-18
Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
PUBLISHED: 2019-02-18
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
PUBLISHED: 2019-02-18
SolarWinds Orion NPM before 12.4 suffers from a SYSTEM remote code execution vulnerability in the OrionModuleEngine service. This service establishes a NetTcpBinding endpoint that allows remote, unauthenticated clients to connect and call publicly exposed methods. The InvokeActionMethod method may b...
PUBLISHED: 2019-02-18
An issue was discovered in WTCMS 1.0. It allows remote attackers to execute arbitrary PHP code by going to the "Setting -> Mailbox configuration -> Registration email template" screen, and uploading an image file, as demonstrated by a .php filename and the "Content-Type: image/g...