flashpoint.io
Open in
urlscan Pro
2606:4700::6812:ee2
Public Scan
URL:
https://flashpoint.io/blog/osint-tools-library/
Submission: On November 13 via manual from US — Scanned from DE
Submission: On November 13 via manual from US — Scanned from DE
Form analysis
3 forms found in the DOMGET https://flashpoint.io/
<form role="search" method="get" id="searchBox" class="searchbox" action="https://flashpoint.io/">
<input type="search" placeholder="Search for topics, resources and solutions" value="" name="s" required="">
<button type="submit" form="searchBox" class="search-submit"><img src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-search.svg" type="image/svg+xml"></button>
</form>
GET https://flashpoint.io/
<form role="search" method="get" id="searchScrollBox" class="searchbox" action="https://flashpoint.io/">
<input type="search" placeholder="What do you want to search for?" value="" name="s" required="">
<button type="submit" form="searchScrollBox" class="search-submit"><img src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-search.svg" type="image/svg+xml"></button>
</form>
POST //translate.googleapis.com/translate_voting?client=te
<form id="goog-gt-votingForm" action="//translate.googleapis.com/translate_voting?client=te" method="post" target="votingFrame" class="VIpgJd-yAWNEb-hvhgNd-aXYTce"><input type="text" name="sl" id="goog-gt-votingInputSrcLang"><input type="text"
name="tl" id="goog-gt-votingInputTrgLang"><input type="text" name="query" id="goog-gt-votingInputSrcText"><input type="text" name="gtrans" id="goog-gt-votingInputTrgText"><input type="text" name="vote" id="goog-gt-votingInputVote"></form>
Text Content
* Platform Why Flashpoint? Learn more about Flashpoint’s products and services. Products * Flashpoint Ignite Cyber Threat Intelligence Vulnerability Management (VulnDB) Brand Intelligence Physical Security Intelligence National Security Intelligence * Managed Attribution * Automate * Cyber Risk Analytics Services * Threat Response & Readiness * Professional Services * Managed Intelligence * Tailored Reporting * Curated Alerting * Request for Information (RFI) * Data-as-a-Service * Solutions By Threats and Risks * Account Takeover * Ransomware * Protective Intelligence By Industry * Financial Services * Retail * Healthcare & Pharmaceuticals * Technology * Public Sector & National Security * Resources Case study How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack * Threat Intel Blog * Events & Webinars * Resource Library * Cybersecurity Glossary * Partners * Company * About Us * Careers * News * Contact Us * Free trial * Log in * ▼ * Why Flashpoint? * Products * Flashpoint Ignite * Cyber Threat Intelligence * Vulnerability Management (VulnDB) * Physical Security Intelligence * National Security Intelligence * Managed Attribution * Automate * Services * Ransomware Attack Response and Readiness * Professional Services * Tailored Reporting * Curated Alerting * Managed Intelligence * Request for Information Solutions * By Threats and Risks * Account Takeover * Ransomware and Data Extortion * Protective Intelligence * By Industry * Financial Services * Retail * Healthcare & Pharmaceutical * Technology * Public Sector & National Security Resource Library * Threat Intelligence Blog * Events & Webinars * Resource Library * Cybersecurity & Intelligence 101 * Partner With Flashpoint Company * About Us * Flashpoint Careers * Flashpoint News * Contact Us * Platform Why Flashpoint? Learn more about Flashpoint’s products and services. Products * Flashpoint Ignite Cyber Threat Intelligence Vulnerability Management (VulnDB) Brand Intelligence Physical Security Intelligence National Security Intelligence * Managed Attribution * Automate * Cyber Risk Analytics Services * Threat Response & Readiness * Professional Services * Managed Intelligence * Tailored Reporting * Curated Alerting * Request for Information (RFI) * Data-as-a-Service * Solutions By Threats and Risks * Account Takeover * Ransomware * Protective Intelligence By Industry * Financial Services * Retail * Healthcare & Pharmaceuticals * Technology * Public Sector & National Security * Resources Case study How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack * Threat Intel Blog * Events & Webinars * Resource Library * Cybersecurity Glossary * Partners * Company * About Us * Careers * News * Contact Us * Free trial * Log in * * Blogs BLOG OSINT TOOLS LIBRARY A constantly updated list of web-based OSINT tools and techniques from across the open-source intelligence community, curated by Flashpoint SHARE THIS: Flashpoint January 13, 2023 Table Of Contents Table of Contents Text-based Search Analysis Automation & Efficiency Data Organization Image & Video Tools Geolocation Identity Protection & Safety Education & Training Welcome! Thank you for visiting our OSINT Tools Library. Here you will find information and links to some of the most useful OSINT tools and techniques from across the OSINT community. We encourage you to bookmark this page and refer back to it to support you in your investigations. This page is updated regularly, so be sure to check in from time to time! TEXT-BASED SEARCH BOOST YOUR GOOGLING SKILLS Google is an incredibly powerful free resource for anyone doing online research. Learn how to get the best results out of this search engine with the company’s own guide to Google search refinement. DETERMINE A DOMAIN’S EXTERNAL THREAT LANDSCAPE theHarvester is a command-line tool included in Kali Linux that acts as a wrapper for a variety of search engines and is used to find email accounts, subdomain names, virtual hosts, open ports/banners, and employee names related to a domain from different public sources (such as search engines and PGP key servers). theHarvester is designed to be used during the reconnaissance stage of a red team assessment or penetration test. SEARCH FOR EMAIL ADDRESSES The service Hunter.io is popular for offensive security professionals and OSINT practitioners looking to find email addresses for members of an organization or to find out additional information about an email address. Hunter.io has a free plan with an API that allows for 25 searches and 50 verifications per month. SEARCH FOR SOURCE CODE If you’re looking at a unique piece of malicious code within a script, it can help to check if that same unique snippet is found elsewhere in the code. PublicWWW is a public search engine for source code that will help you do exactly that. For a good example, find a small portion of the Magecart skimmer, put it into the search engine, and look at the results. FIND DEEP WEB DATA 90% of the internet isn’t indexed by search engines. This includes many internal links and deep websites. If you’re looking for a file that was shared by a company between two people or organizations, you most likely won’t be able to find it in Google or any other search engine. URLScan has many of these links indexed in their historical scans. If you type in a domain for any website into their search engine, you’ll find multiple links from that domain in the search results. It’s a great way to do deep web research without needing access or logins. SEARCH FOR BITCOIN ADDRESSES Blockchain and cryptocurrency investigations have been a rather recent development in the OSINT space and are gaining relevance as more threat actors and scams begin using cryptocurrency as their transaction method of choice. If you’re looking into a crypto wallet related to ransomware, blackmailing, fraud, etc., check out chainabuse.com. It’s a public database of addresses used for nefarious reasons. They also have an API if you want to build an OSINT tool for crypto. POWER UP YOUR SEARCH You.com is an AI-powered search engine. It’s privacy-centric (like DuckDuckGo), but it has built-in functionality like social media searching, video searching, etc. and it separates the results by category. SEARCH PASTEBIN DUMPS Pastebin is a great resource for OSINT collection. A great tool to search for Pastebin data is PsbDmp. At the time of writing this, PsbDmp had 25990293 Pastebin dumps in its archive. You can easily use its search engine to check if the data point you’re investigating is in its archive. SEARCH SHODAN If you’re doing technical OSINT collection or investigation, you’ve probably heard of Shodan. At first glance, Shodan can be intimidating and it can be hard to find what you’re looking for. Fortunately, Jake Jarvis put together a guide with multiple use cases and examples for searching on Shodan. From prison pay phones to industrial control systems, there’s a ton of untapped potential inside of Shodan’s index. LOOK UP BUSINESSES USING SECRETARY OF STATE DATA If you’re doing business-related investigations for entities in the United States, you’ll often be requested to pull Secretary of State documents for state filings of that business. These can be hard to track down if you visit each individual state website and pull the information that way. Fortunately, Cobalt Intelligence made a tool that pulls Secretary of State filings for businesses in all states from one search engine, saving a lot of time on business lookups. COLLECT WEBSITE METADATA If collecting metadata is important to your OSINT workflow or are building a URL or domain-specific OSINT tool, finding a reliable, fast way of grabbing that information from a target URL can be tricky if that’s not your area of expertise. Fortunately, there’s an API called Website Metadata that can easily grab metadata for any URL you specify. REVERSE CLEARTEXT AND HASHED PASSWORDS Similar to using Google dorks for Pastebin, you can also reverse cleartext and hashed passwords to find more information. If you have a cleartext password, use an online hashing tool like MD5 Hash Generator to turn it into a hash; if you have a hashed password, use hashes.com to turn it into cleartext. From there, you can use tools like Dehashed or IntelX to turn those cleartext or hashed passwords into emails, phone numbers, names, etc. to further expand your ability to pivot across different data sources and build a full digital record. FIND LEAKED EMAILS ON GITHUB If you’re doing OSINT investigations into GitHub repositories, you might be interested to see who is all making commits to that project. Fortunately, finding email addresses in these commits from Github users is pretty simple. The hard part is grabbing all of that content, specifically on larger projects. GitRecon will do that for you in one motion. Example: You find a GitHub repository that says it’s a PoC of an exploit for a software vulnerability. Upon further investigation, you find that it’s actually a honeypot for malware. You can use GitRecon to figure out who is involved if that information is available. UNCOVER MORE LINKEDIN DATA If you’re doing OSINT research and come across information from LinkedIn but your sock account isn’t a close enough connection to the target to get useful information, Revealin might help you uncover more. Exploiting a design flaw in LinkedIn, Revealin gives you the full name of a person when it only shows only an initial without needing to expand your network. Think about the methods this tool uses. The more familiar you are with these concepts, the more you can find your own internet easter eggs and level up your OSINT game. GATHER OSINT FROM HASHES ON PASTEBIN If you’re looking to collect a series of hashes values, such as passwords or IOCs, you can use a specific Google dork to locate them in a website like Pastebin. site:pastebin.com intext:“SHA256” You can change out SHA256 with any other algorithm including: MD5, SHA1, MySQL, NTLM, or SHA512. Once you have a hash, you can check it against places like VirusTotal to see if it’s malicious or not. LOOK UP PHONE NUMBERS WITH PHOMBER Phomber is an easy-to-use, free Python tool for reverse phone number lookups. FIND THE PERSON’S NAME BEHIND ANY GMAIL ADDRESS 1. Create a Google document 2. Share the document with the Gmail address 3. Untick the “Notify people” box The name will be disclosed. SEARCH USERNAMES ACROSS MULTIPLE DOMAINS Developed by a group of OSINT practitioners, the WhatsMyName tool allows you to enumerate usernames across many websites. The results can be exported as a CSV, PDF, or Excel file. SEARCH SOCIAL MEDIA USERNAME AVAILABILITY Namecheckup.com enables you to search for social media username availability across 253 different platforms and apps. It also helps investigators locate additional profiles for individuals who used the same username for several profiles. CHECK DOMAIN AVAILABILITY Namechk checks 36 different domain name possibilities and 100+ social media websites and online platforms. Sites include Facebook, Twitter, YouTube, Blogger, Twitch, Tumblr, TikTok, WordPress, eBay, Yelp, Flickr, and PayPal. SEARCH MULTIPLE ONLINE MARKETPLACES AT ONCE SearchTempest is a search engine for online classified ads that delivers results from all of Facebook Marketplace, Craigslist, eBay, and Amazon, and several others. GATHER INFORMATION FROM INSTAGRAM Toutatis allows you to extract information from Instagram accounts such as e-mails, phone numbers, and more. (Python required). SEARCH FACEBOOK Who Posted What is a Facebook keyword search for people who work in the public interest. It allows you to search keywords on specific dates. Donations are encouraged. SEARCH A DIGITAL LIBRARY Internet Archive is a non-profit library of millions of free books, movies, software, music, websites, and more. Its mission is to provide universal access to all knowledge. REVERSE EMAIL SEARCH Epeios is a search engine that allows you to perform reverse email searches, find related Google reviews, and see which websites are associated with any email address. ANALYSIS INVESTIGATE URL SHORTENED LINKS FOR OSINT If you’re doing OSINT data collection at scale, you’re likely to come across a lot of shortened links. If you try to manually investigate each one, which is a viable method, it’s going to take a lot of time. Fortunately, there’s an open-source tool that will expand those links for you at scale. Links like bit.ly, adf.ly, lnx.lu, linkbucks.com, and adfoc.us can be expanded automatically with urlExpander. Whether you have a million links or a hundred, be sure to check it out. VISUALLY INVESTIGATE CRYPTOCURRENCY If you’re tracking a lot of illicit actors, you’ve probably had some exposure to cryptocurrency investigations. A common challenge in crypto investigations is making sense of extremely large datasets. Many tools will show you a single connection and rely on you importing that information into a different tool like Maltego to form visual connections. Breadcrumbs is a blockchain analytics platform accessible to everyone. It offers a range of tools for investigating, monitoring, tracking, and sharing relevant information on blockchain transactions. It solves the problem of connecting the dots between transactions and wallets. The free tier provides limited access to almost all functions including monitoring and graph creation. Whether you’re new to this space or looking for a budget-friendly solution, this is worth a look. LEVERAGE THIS DOMAIN OSINT MULTI-TOOL For investigations, it’s helpful to keep a running list of found data points into as many tools and resources as possible. Sometimes a slight change in configuration from one tool to another can offer a different angle or set of information. Investigator is an OSINT multi-tool for domains. It has a variety of modules to help dig deeper into specific categories. The web app format makes it possible to use with limited technical knowledge or in controlled environments. TRY BITCROOK Bitcrook is an OSINT multi-tool that might check a couple of your boxes in a single script. Bitcrook is unique because it factors in court cases from case.law and data from Melissa. It also has standard modules like IP and username lookup. FIND OUT HOW A SITE WAS BUILT Builtwith enables you to look under the hood of any website so you can understand how it functions and what frameworks/technologies it is using. AUTOMATION & EFFICIENCY SHORTEN REPETITIVE TASKS IN TERMINAL If you spend a lot of time in the terminal for OSINT collection and analysis, you probably run the same commands over and over. There’s the classic meme of pressing the up arrow a million times until you find the command you were looking for. What if you could create a shortened version of that command to reference quickly and use at will? PCMD lets you do that. Type in a long, specific command, save it as a shortcut with PCMD, and use it over and over without having to type it out. DISCOVER THE BEST OSINT THREADS Some of the best OSINT techniques and workflows can be found on Twitter. The issue with Twitter is that they break them up into multiple messages so discovering threads can be difficult if the post doesn’t specifically say it’s a thread. If you’ve read a thread on Twitter before, you have likely seen people tagging apps like ThreadReaderApp to consolidate the thread into one post. What you might not know is that you can query all threads they create on their website just by searching for #OSINT. COLLECT ONION URLS AUTOMATICALLY Because the dark web doesn’t have a free, unified search engine like Google, OSINT researchers who don’t have access to a service like Flashpoint have to either hunt for it manually or rely on static databases like dark.fail to find more. OnionSearch aggregates the search results of multiple dark web search engines that index these links allowing you to search for things in multiple places at once. If you’re looking for a free tool to discover new dark web URLs, OnionSearch is worth checking out. REMOVE WEB ELEMENTS MORE EFFICIENTLY Many OSINT workflows require adding and removing web elements to reveal certain details. Snip allows you to permanently remove certain web elements so that you never see them again. This is very useful for frequently visited websites. BUILD WORKFLOWS WITH AUTOMA This Chrome extension allows you to create a workflow using a drag-and-drop interface and save it as a playbook to replay at any time. From auto-fill forms, to repetitive tasks, to taking screenshots, to scraping data from a website, Automa is pretty flexible. If you want to automate some of your OSINT workflows, give this a spin. EXTRACT DATA FROM ANY WEBSITE Instant Data Scraper is an automated data extraction tool for any website. It uses AI to predict which data is most relevant on an HTML page and allows saving it to Excel or CSV files (XLS, XLSX, CSV). AUTOMATE SCRAPING WITH BROWSE AI If you’ve ever used Instant Data Scraper, this tool will be very familiar to you. What Browse AI does that Instant Data Scraper doesn’t is set up automated scraping tasks and export the results automatically to a Google Sheet. If you want a no-code way of scraping websites or want to build quick proofs on concepts before committing to writing a custom web scraper, give this a shot. AUTOMATE WRITING TASKS WITH TANGO For writers of blog posts or documentation articles, Tango is a very handy tool. Tango allows you to write step-by-step tutorials with screenshots in a few seconds. It works by recording your actions on the screen while enabled and converting that into a process-based how-to guide when the recording stops. MANIPULATE DATASETS FROM TERMINAL OSINT practitioners frequently run across TXT and CSV files. Often, the formatting for CSV files is not compatible with your investigation and you need to remove certain columns, add others, change column titles, etc. If you’re looking to remove all columns except for a select few, use this trick: $ cut -d, -f<column number> –complement input.csv > output.csv Example: $ cut -d, -f4 –complement osint.csv > oshint.csv This will remove the fourth column of osint.csv and save it to oshint.csv. If you remove –complement, you’ll remove all columns except for column 4. To learn more about this Linux command, check out this article. SEARCH THROUGH LARGE DATASETS WITH EASE Leaked credential databases are a key component to investigations into individuals with a small digital footprint. Sometimes, these datasets can be hundreds of gigabytes in size. Opening them in any software or browser and looking for applicable information can be a struggle. Enter Ripgrep. It allows you to recursively look through a database—regardless of size—for a specific data point, and see if it exists. There’s a bit of a learning curve so you might want to check out this video before getting started. DATA ORGANIZATION EXPORT OR PRINT FULL-PAGE SCREENSHOTS GoFullPage is a Google Chrome extension that allows you to capture an entire webpage as a screenshot. This is useful for storing or archiving pages in a specific state—or when you need to share a webpage with someone who might not have access to that page. ARCHIVE DIGITAL EVIDENCE Save as MHTML is useful, but is limited in the fact that it can only capture one page at a time. If you want to download multiple pages or an entire website as MHTML. Enter SinglePage. SinglePage allows you to capture the current tab, a specific selection, multiple tabs, highlighted text, etc. It also has a SHA256 module to hash your evidence. MANAGE CSV FILES WITH CSVKIT If you’re dealing with spreadsheets on a regular basis, it can be hard to manage really large datasets. CSVKit is a suite of command-line tools for converting to and working with CSV files. It allows you to convert file types (like CSV to JSON), select certain types of information from the dataset, or import the data to PostGreSQL. The lookup capability is especially useful. Example: csvgrep -c phone_number -r “555-555-\d{4}” data.csv > new.csv You can lookup a phone number and take it from the main dataset and add it to a new one. CONVERT URLS TO PDFS PDF my URL allows you to download a website to a PDF for offline viewing. You can convert a single page or an entire website to a PDF and remain anonymous because the app’s IP address requests the information from the website, not yours. SAVE WEBPAGES AS HTML FILES SingleFile is a Google Chrome extension that helps you to save a complete page (with CSS, images, fonts, frames, etc.) as a single HTML file. IMAGE & VIDEO TOOLS REVERSE IMAGE SEARCH WITH REVEYE RevEye is a Firefox add-on that allows you to perform reverse image search with Google, Bing, or Tineye. TRY A VISUAL SEARCH WITH MICROSOFT BING Bing visual search is simple and intuitive, allowing you to drag and drop any image, type any URL into the search bar, or even take a photo directly in its home dashboard. VERIFY CONTENT ON SOCIAL NETWORKS The InVID verification plugin is a Chrome extension designed to help journalists debunk fake news and verify image and video content. FIND AND DOWNLOAD ALL IMAGES ON A WEB PAGE Imageye Image Downloader is a tool that helps you find the images published on a web page. GET BETTER INSTAGRAM DATA A common method for finding connections on social media is by looking at followers, followings, and engagements (comments, likes, etc.). Instagram is becoming more and more difficult to collect data from. Sterra allows you to get information about an Instagram account through its followers and followings. Here are some things it considers: * A probability function to determine the close social circle of your target * Export of the followers / following lists (with their details) to excel and csv CAPTURE YOUTUBE METADATA AT SCALE If you’re collecting video OSINT, it’s important to document the metadata. For YouTube specifically, YouTube Metadata Bulk allows you to capture metadata for a single video or for a list of videos. That metadata can be exported as TXT, JSON, CSV, or PNG. Entities like tags, geolocation, links, and upload times can be grabbed instantly. BUILD YOUR OWN REVERSE IMAGE SEARCH Reverse image searching is a major technique used in OSINT collection and analysis. The issue with many reverse image tools is that you’re reliant on the algorithms of Google, etc. to find a positive match. While these tools are often reliable, wouldn’t it be great if you could build your own? Well, you can. This Github project gives provides the foundation for building your own reverse image tool. It’ll find exact matches and near matches out of the box; however, you could combine it with things like facial recognition to make it more sophisticated and accurate. SCAN AND DETECT DEEPFAKE VIDEOS Deepfake videos are becoming a huge problem on the internet. From Tom Cruise, to Barack Obama’s public service announcements, the future of disinformation looks pretty grim with the ability to create fake videos that fool the masses. Deepware provides a web app and API that helps identify deepfake videos. Whether it’s stored locally or hosted on a URL online, you can send it to Deepware for review. If you want to add this capability to an OSINT tool, the API is very straightforward and easy to use. TRY FACEBOOK’S BUILT-IN OCR You can search for specific alphanumeric strings, such as license plate numbers on Facebook and comb through images to find a match. Facebook automatically tries to use OCR within its images for displaying relevant results. I tried a search for “MWP-46-99” (a license plate) and got the following result: VIEW IMAGE EXIF DATA EXIFdata.com is an online application that lets you upload an image and view the associated data such as shutter speed, exposure compensation, F number, date, time, and more. GEOLOCATION IMPROVE YOUR GEOLOCATION SKILLS GeoGuessr has become the official primer for developing your geolocation skills. It gives you continuous exposure to different scenarios to train your deduction skills. Give it a read or three and watch your scores improve. Take what you learn on GeoGuessr and apply it to real challenges. BOOTSTRAP GEOLOCATION AllYouCanRead is a collection of newspapers that are local to a specific city, county, etc. If you collect all of the newspapers you’re interested in and pull their RSS feed, you can use keyword filters to look for keywords of locations within publications of papers local to that location. So looking for “San Francisco” in a San Francisco-based newspaper is likely to yield results from that area. Scale that across multiple cities and countries and you have bootstrapped geolocation. DETECT SHIPS The Ship Detection Tool, built by Bellingcat, is a satellite imaging tool that uses Synthetic Aperture Radar (SAR) imagery to identify ships in port, at anchor, or at sea. > “Open-source information is going to be of incalculable value both to our > intelligence community and military in the future.” > > Glenn gerstell, former general counsel of the national security agency IDENTITY PROTECTION & SAFETY IDENTIFY BREACHED ACCOUNTS Have I Been Pwned is a free web-based tool that allows you to quickly assess if you may have been put at risk due to an online account having been compromised or “pwned” in a data breach. CHECK DATA POINTS AGAINST SPAM If you’re investigating a lot of data, specifically IP addresses, emails, or usernames, make sure to check Stop Forum Spam to see if any of the data points you’re dealing with are found there. If you find a positive hit on any of your searches, you can pivot on the found data points to find more information. Example: If you have an IP address and get a match, it’ll give you an email and a username. You can reverse those back into Stop Forum Spam or any other OSINT tool you use. CREATE CREDIT CARDS FOR YOUR SOCK PUPPET When building a sock puppet (alternate persona), it’s important to create as complete a profile as possible. Many websites require a credit card to sign up. Using Card Generator, you can make a card tied specifically to your sock puppet and maintain consistency across the web without compromising your identity. EDUCATION & TRAINING LEVEL UP YOUR TELEGRAM INVESTIGATIONS If you’re collecting data from Telegram, there are a ton of tools you can use to find new users, groups, channels, etc. Awesome Telegram OSINT is a collection of tools, tactics, and techniques for extracting information from Telegram. If you’re a seasoned Telegram collector or just getting started, this is your one-stop shop. WEBINAR REPLAY Telegram for OSINT: Level Up Your Investigations Watch Now READ OSINT CASE STUDIES One of the best ways to learn about new tools, tactics, and techniques is to read case studies. “Exposing the Invisible” has a list of case studies on its website that can inspire you in your own investigations. CHECK OUT MORE OSINT RESOURCES * Oh Shint on GitHub. * osintcurio.us OSINT TRAINERS: * SANS Institute * Hetherington Group * Toddington International * Camelot Investigations BEGIN YOUR FREE TRIAL TODAY. Get a Free Trial Contact Sales 6218 Georgia Avenue NW Suite #1 PMB 3032 Washington, DC, 20011 United States +1 (888) 468-3598 Contact us * * * * * Platform * Why Flashpoint? * Flashpoint Ignite * Cyber Threat Intelligence * Vulnerability Management (VulnDB) * Physical Security Intelligence * National Security Intelligence * Managed Attribution * Automate * Cyber Risk Analytics * Ransomware Attack Response and Readiness * Professional Services * Managed Intelligence * Tailored Reporting * Curated Alerting * Request for Information (RFI) * Solutions * Cyber Threat Intelligence * Fraud * Corporate and Physical Security * Vulnerability Management * DevSecOps * Insider Threat * Financial Services * Retail * Healthcare & Pharmaceutical * Technology * Public Sector & National Security * Company * About Us * Flashpoint Careers * Flashpoint News * Contact Us * Resources * Threat Intelligence Blog * Resource Library * Events & Webinars * Partner With Flashpoint * Cybersecurity & Intelligence 101 © 2023 Flashpoint. All rights reserved. * Privacy Policy * Terms of Service * Cookie Policy * CCPA * Legal Originaltext Diese Übersetzung bewerten Mit deinem Feedback können wir Google Übersetzer weiter verbessern We have updated our Privacy Policy and Cookie Policy which go into effect on May 25, 2018, to comply with the new requirements of GDPR. These changes reflect increased transparency requirements mandated by the GDPR. Changes include clarifying and providing additional information about: your privacy rights and how to exercise them; how we collect, use, share and protect your personal information; and the legal bases we rely on to process your personal information. Please review these policies to confirm your acceptance of the recent changes. Continue? Yes No