flashpoint.io Open in urlscan Pro
2606:4700::6812:fe2  Public Scan

Submitted URL: https://go.flashpoint.io/e/272312/campaign-id-7013l000001BgKRAA0/24vz45j/1437040374?h=cVqix4u3Tx5Udq_FGcKIMohROCG-hY-uA9r...
Effective URL: https://flashpoint.io/blog/risk-intelligence-year-in-review/?utm_campaign=IB_Newsletter_122222_AMER&utm_source=pardot&...
Submission: On December 22 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://flashpoint.io/

<form role="search" method="get" id="searchBox" class="searchbox" action="https://flashpoint.io/">
  <input type="search" placeholder="Search for topics, resources and solutions" value="" name="s" required="">
  <button type="submit" form="searchBox" class="search-submit"><img src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-search.svg" type="image/svg+xml"></button>
</form>

GET https://flashpoint.io/

<form role="search" method="get" id="searchScrollBox" class="searchbox" action="https://flashpoint.io/">
  <input type="search" placeholder="What do you want to search for?" value="" name="s" required="">
  <button type="submit" form="searchScrollBox" class="search-submit"><img src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-search.svg" type="image/svg+xml"></button>
</form>

Text Content

 * Platform
   Platform Overview
   Learn more about Flashpoint’s products and services.
   Products
    * Flashpoint Intelligence Platform
    * Compromised Credentials Monitoring
    * Payment & Credit Card Fraud Mitigation
    * Brand Exposure Protection
    * Managed Attribution
    * Flashpoint Automate
    * VulnDB
    * Echosec
   
   Services
    * Threat Response & Readiness
      
    * Professional Services
      
    * Managed Intelligence
      
    * Tailored Reporting
      
    * Curated Alerting
      
    * Request for Information (RFI)
      

 * Solutions
   By Function
      
    * Cyber Threat Intelligence
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Fraud
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Corporate & Physical Security
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Vulnerability Management
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * DevSecOps
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Insider Threat
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
   
   By Industry
    * Financial Services
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Retail
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Healthcare & Pharmaceuticals
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Technology
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Public Sector & National Security
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.

 * Resources
   Featured
   Definitive Guide to Ransomware
   What it is and how your organization can respond to a ransomware attack
    * Threat Intel Blog
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Events & Webinars
      
    * Resource Library
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Partners
      

 * Company
      
    * About
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Careers
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * News
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Contact Us
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.

 * Free trial
 * Log in
 * ▼
 * 


Platform
* Products
  * Flashpoint Intelligence Platform
  * Compromised Credentials Monitoring
  * Payment and Credit Card Fraud Mitigation
  * Brand Exposure Protection
  * Managed Attribution
  * Flashpoint Automate
  * VulnDB
  * Echosec
* Services
  * Ransomware Attack Response and Readiness
  * Professional Services
  * Tailored Reporting
  * Curated Alerting
  * Managed Intelligence
  * Request for Information
Solutions
* By Function
  * Cyber Threat Intelligence
  * Fraud
  * Corporate and Physical Security
  * Vulnerability Management
  * DevSecOps
  * Insider Threat
* By Industry
  * Financial Services
  * Retail
  * Healthcare & Pharmaceutical
  * Technology
  * Public Sector & National Security
Resource Library
* Threat Intel Blog
* Events & Webinars
* Resource Library
* Partners
Company
* About Us
* Careers
* Flashpoint News
* Contact Us



 * Platform
   Platform Overview
   Learn more about Flashpoint’s products and services.
   Products
    * Flashpoint Intelligence Platform
    * Compromised Credentials Monitoring
    * Payment & Credit Card Fraud Mitigation
    * Brand Exposure Protection
    * Managed Attribution
    * Flashpoint Automate
    * VulnDB
    * Echosec
   
   Services
    * Threat Response & Readiness
      
    * Professional Services
      
    * Managed Intelligence
      
    * Tailored Reporting
      
    * Curated Alerting
      
    * Request for Information (RFI)
      

 * Solutions
   By Function
      
    * Cyber Threat Intelligence
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Fraud
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Corporate & Physical Security
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Vulnerability Management
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * DevSecOps
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Insider Threat
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
   
   By Industry
    * Financial Services
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Retail
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Healthcare & Pharmaceuticals
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Technology
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Public Sector & National Security
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.

 * Resources
   Featured
   Definitive Guide to Ransomware
   What it is and how your organization can respond to a ransomware attack
    * Threat Intel Blog
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Events & Webinars
      
    * Resource Library
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Partners
      

 * Company
      
    * About
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Careers
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * News
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.
    * Contact Us
      Lorem ipsum dolor sit amet, consectetur adipiscing elit.

 * Free trial
 * Log in
 * 
 * 




Blogs

BLOG


FLASHPOINT YEAR IN REVIEW: 2022 INTELLIGENCE RETRO

Flashpoint’s annual Year In Review highlights the freshest and most compelling
intelligence insights from the last year—plus a look ahead to 2023.

SHARE THIS:
Flashpoint Team
November 30, 2022

Table Of Contents

Table of Contents
Flashpoint in the News
Holiday Shopping Threat Landscape
Retail Cyber Threat Landscape
Breaches and Malware Threat Landscape
Insider Threat Landscape
Financial Threat Landscape
Healthcare Threat Landscape
Cryptocurrency Threat Landscape

Flashpoint’s annual Year In Review highlights the freshest and most compelling
intelligence insights from the last year—plus a look ahead to 2023. Our yearly
wrap-up includes a diverse set of data-driven analyses covering a variety of
threat landscapes affecting organizations across the world.


FLASHPOINT IN THE NEWS


HOW FLASHPOINT SHAPED THE NEWS: A YEAR OF BLOGS AND PRESS

Flashpoint intelligence analysts worked with reporters at a wide variety of
publications—such as The Wall Street Journal, Axios, The Washington Post, WIRED,
The Financial Times, Bloomberg, Dark Reading, ThreatPost, Bleeping Computer and
more.

We’ve put together some of the most important Flashpoint blogs and press
clippings that illustrate how our intelligence, innovations, and impact has
helped organizations address a wide variety of cyber and physical security
challenges.

Read more here >>


HOLIDAY SHOPPING THREAT LANDSCAPE


THE COMPLETE HOLIDAY SHOPPING THREAT LANDSCAPE

With the holiday retail season in full swing—and with hundreds of billions of
dollars in purchases on the table—threat actors are ready to strike. This report
outlines the cyber and physical threats that retailers and their partners should
prepare for in order to prevent and mitigate risk.

Read more here >>


RETAIL CYBER THREAT LANDSCAPE


FLASHPOINT YEAR IN REVIEW: 2022 RETAIL CYBER THREAT LANDSCAPE 

Throughout the year, threat actors leverage a variety of tactics to profit at
the expense of retailers and consumers alike. From fraud to ransomware, this
report reviews the TTPs and risks faced by organizations in 2022, and analyzes
what the 2023 retail threat landscape may look like so security teams can be
prepared to defend against it.

Read more here >>


BREACHES AND MALWARE THREAT LANDSCAPE


FLASHPOINT YEAR IN REVIEW: 2022 BREACHES AND MALWARE THREAT LANDSCAPE

Mostly motivated by greed, threat actors will target any organization regardless
of sector. Therefore, data breaches provide key insights into the methods and
tactics of hackers. This report reviews who was affected by breaches and where
they took place in 2022—helping you gain visibility into your risk profile.

Read more here >>


INSIDER THREAT LANDSCAPE


FLASHPOINT YEAR IN REVIEW: 2022 INSIDER THREAT LANDSCAPE

To increase their chances of success, threat actors will often seek the aid of
disgruntled, or malicious employees within the organizations they are targeting.
After all, why waste resources navigating through security measures when you can
get someone on the inside to circumvent them for you? As such, the tactic of
recruiting insiders has become immensely popular amongst hackers aiming to
breach systems and/or commit ransomware attacks. Here’s what we saw unfold in
the insider threat landscape in 2022.

Read more here >>


FINANCIAL THREAT LANDSCAPE


FLASHPOINT YEAR IN REVIEW: 2022 FINANCIAL THREAT LANDSCAPE

The financial sector contains a wealth of sensitive data, which threat actors
seek to exploit for monetary gain. The financial threat landscape includes both
cyber and physical risks, and it’s critical that organizations are prepared to
defend their assets, infrastructure, and personnel from diverse forms of harm.
This report outlines the top threats observed targeting the financial sector in
2022, and provides insights to help security teams prepare for 2023.

Read more here >>


HEALTHCARE THREAT LANDSCAPE


FLASHPOINT YEAR IN REVIEW: 2022 HEALTHCARE THREAT LANDSCAPE

Healthcare-related advertisements and solicitations remained popular among
threat actor communities within this year. Threat actors continued to buy and
sell network access to healthcare organizations, pharmaceutical companies,
insurance organizations, and third-party resources that store PHI, such as
patient data, “fullz” (full packages of personally identifiable information),
COVID-19 passports, prescriptions, insurance information, and Medicare data.

Read more here >>


CRYPTOCURRENCY THREAT LANDSCAPE


FLASHPOINT YEAR IN REVIEW: 2022 CRYPTOCURRENCY THREAT LANDSCAPE

Even if the general public loses trust in cryptocurrency due to the fallout of
large crypto entities like FTX and Terra’s LUNA, cryptocurrency will likely
remain a viable option to evade sanctions and crowdsource financial donations
for governments and/or extremist groups. Bitcoin remained the most-discussed
crypto in the threat actor community and the most-used crypto for accepting
illicit payments in 2022, with Flashpoint analysts identifying over 50,000
unique Bitcoin addresses circulating in Flashpoint collections this year alone.

Read more here >>


BEGIN YOUR FREE TRIAL TODAY.

Get a Free Trial

Contact Sales

6218 Georgia Avenue NW
Suite #1
PMB 3032
Washington, DC, 20011
United States

+1 (888) 468-3598

info@flashpoint-intel.com

 * 
 * 
 * 
 * 

 * Platform
   * Platform Overview
   * Flashpoint Intelligence Platform
   * Compromised Credentials Monitoring
   * Payment and Credit Card Fraud Mitigation
   * Brand Exposure Protection
   * Managed Attribution
   * Flashpoint Automate
   * VulnDB
   * Echosec
   * Ransomware Attack Response and Readiness
   * Professional Services
   * Managed Intelligence
   * Tailored Reporting
   * Curated Alerting
   * Request for Information (RFI)
 * Solutions
   * Cyber Threat Intelligence
   * Fraud
   * Corporate and Physical Security
   * Vulnerability Management
   * DevSecOps
   * Insider Threat
   * Financial Services
   * Retail
   * Healthcare & Pharmaceutical
   * Technology
   * Public Sector & National Security
 * Company
   * About Us
   * Careers
   * Pricing
   * Flashpoint News
   * Contact Us
 * Resources
   * Threat Intel Blog
   * Resource Library
   * Events & Webinars
   * Partners
   * Help Center

© 2022 Flashpoint. All rights reserved.
 * Privacy Policy
 * Terms of Service
 * Cookie Policy
 * CCPA
 * Legal


ORIGINALTEXT


Bessere Übersetzung vorschlagen

--------------------------------------------------------------------------------





Cookies Button

By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Cookie Policy

Accept All Cookies
Cookies Settings



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

Cookies Details‎
Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * 
   
   View Cookies
   
    * Name
      cookie name

Confirm My Choices

We have updated our Privacy Policy and Cookie Policy which go into effect on May
25, 2018, to comply with the new requirements of GDPR. These changes reflect
increased transparency requirements mandated by the GDPR. Changes include
clarifying and providing additional information about: your privacy rights and
how to exercise them; how we collect, use, share and protect your personal
information; and the legal bases we rely on to process your personal
information. Please review these policies to confirm your acceptance of the
recent changes. Continue? Yes No