Flare and GDPR Compliance: A Quick Guide

At Flare, we take all forms of security seriously, including the protection of your personal data. This includes compliance with the General Data Protection Regulation (GDPR) when processing personal data on behalf of our customers. To learn more, take a look at our Legal Center, specifically the Privacy Policy and Data Processing Addendums.  For 16 […]

Launching Leaky Weekly with Flare, Cybercrime Current Events Podcast

There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a cybercrime current events podcast hosted by security researcher Nick Ascoli as he dives into the most pressing stories on data leaks, cybercrime, and the dark web in the last week or so. On this episode of […]

Let’s Meet at Hacker Week in Las Vegas!

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Let's Meet at Hacker Week in Las Vegas!" with a light orange arrow pointing down.

The Flare team will be in Vegas this week for Hacker Week! If you are attending BSides Las Vegas or DEFCON, come meet our team either at the Flare booth or around the venue. There’s a chance to win a free bottle of scotch! BSides Vegas  Booth #9, August 6-7  Come by our booth for […]

ShapeUp at Flare: A Game-Changer for Project Management

Navy background on the left side with the copy in ShapeUp at Flare: A GameChanger for Project Management." On the right is a lighter blue background and graphic of a person's hand pointing at a board and another set of hands holding a tablet.

I first encountered ShapeUp during one of my initial interviews for a position at Flare. My soon-to-be manager mentioned, “We’re using a methodology that works well for us, but you might not have heard of it before.” With over 10 years of software development experience under my belt, I was skeptical. “If there was a […]

Red Teaming the Modern Attack Landscape

Navy background with lines in the corner with the white text "Red Teaming the Modern Attack Landscape" over it on the left side of the image. To the right is a desktop monitor and a laptop, with 2 peoples' hands pointing at the screens.

In today’s expanded attack surface, new technologies create new opportunities for businesses and malicious actors. Attackers can use the same artificial intelligence (AI) and large language models (LLMs) that companies use, often in the same way. In both cases, these technologies reduce the time spent on repetitive, manual tasks. For example, organizations may use LLMs, […]

Using CTI to Help Predict Vulnerability Exploitability

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Using CTI to Help Predict Vulnerability" with a light orange arrow pointing down.

In a world of increasingly powerful data analytics, security researchers continue to develop new uses for artificial intelligence (AI) and machine learning (ML). In security, predictive analytics offer insight into how a company should prioritize its activities. With more vulnerabilities detected daily, vulnerability management teams become overwhelmed, unable to patch or remediate everything all at […]

AlphaLock, Threat Actor Branding, and the World of Cybercrime Marketing

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "AlphaLock, Threat Actor Branding, and the World of Cybercrime Marketing" with a light orange arrow pointing down.

Threat actors are not a monolith in their approach to cybercrime. The popular perception is that threat actors steal information for the sake of it, while knowing and accepting that they are doing something wrong. However, some threat actors also justify their actions by promoting an image that their activity ethically advances the cause of […]