Cybercriminals, hackers, extremists, and other threat actors continue to plan and conduct harmful activities in the most opaque regions of the Internet. With illicit activity rampant in underground communities, continually monitoring the flood of data for business risk is critical. Flashpoint’s Alerting is used to inform customers when

relevant information is uncovered in threat actor discussions and compromised data is detected. If an alert requires technical, domain, or linguistic expertise for customers to fully assess it, Flashpoint also offers curated alerting where our multilingual intelligence analysts add additional context to relevant identified data.



Matches conversations from illicit online communities with a client’s areas of concern, and automatically provides these matches directly to the user. Generated alerts are available in the Flashpoint Intelligence Platform, ensuring timely notifications that identify potential risks to the organization, as well as the ability to investigate further within the platform. Customers are able to update, improve, and alter their queries via the platform on an as-needed basis.


A service to curate alerts for relevance and add context as necessary, creating a more easily consumable intelligence alerting experience. With Curated Alerting, analysts evaluate content collected from illicit communities, assist with a threat/risk assessment to inform search patterns, review resulting alerts, and provide a brief assessment.


Provides customers tactical information derived from conversations from illicit online communities to users in their respective industries. Customers receive relevant information in addition to their intelligence requirements, providing further context and insight into threats affecting their industry. The searches are created, vetted, and refined by Flashpoint’s Tactical Threat Monitoring (TTM) team and consist of information in addition to the organization’s collections and key terms.


Identifies customer and company data, source code, or vulnerable systems within open-source datasets and public-facing infrastructure in order to prevent actors from leveraging exposed data for illicit activity. Through the Flashpoint Alerting capability, users are able to construct targeted queries to ensure swift notification of leaked

assets as it relates to their organization and intelligence requirements.

Did this answer your question?