Get Ahead of
Cyber Threats
Tags
Sandworm Threat Guide
Sandworm, a Russian cyber threat group, targets critical infrastructure in regions that have geopolitical tension with Russia. Get an overview & the latest.
Articles
April 24, 2024
Jake Trujillo
/
Latrodectus Threat Guide
Latrodectus is new malware, suspected to be an evolution of IcedID, being distributed by initial access brokers TA577 & TA578. Get an overview and the latest.
Articles
April 18, 2024
Jake Trujillo
/
Cybersecurity Platform Fletch Issues Report on Threat Trends to Be Aware of
The Fletch report debunks myths touted by first-wave cybersecurity tools; highlights what business leaders should know about current threat landscape
News
April 16, 2024
Kenisha Liu
/
The problem with Open Source Intelligence
While Open Source Intelligence offers timely data & actionable threat insights, extracting it is near impossible. Let’s dive into the problem & modern solution.
Articles
April 16, 2024
Kenisha Liu
/
LockBit Threat Guide
LockBit, a Ransomware as a Service threat actor, has had several key evolutions and updates since its emergence in 2019. Get an overview and the latest.
Articles
April 10, 2024
Jake Trujillo
/
Revolutionizing OSINT in cybersecurity with Fletch
Fletch is revolutionizing the use of OSINT in cybersecurity by harnessing artificial intelligence, transforming painful processes into something timely, contextual, and automated.
Articles
April 10, 2024
Kenisha Liu
/
XZ Vulnerability Analysis: Year-by-Year Timeline and Impact
There’s never been a supply chain attack like the XZ vulnerability. Up to 60-70% of internet-facing systems could have been vulnerable to the exploitation. Learn more.
Articles
April 03, 2024
Kenisha Liu
/
BlackCat Ransomware Threat Guide
The BlackCat threat group has quickly become a significant player in the threat landscape since its emergence in November 2021. Get an overview and the latest.
Articles
March 23, 2024
Kenisha Liu
/
Introducing AskFletch
When you need threat answers, Ask Fletch. It's not another AI chatbot; it's a revolutionary tool designed to help you navigate the complex threat landscape.
Product
March 11, 2024
Kenisha Liu
/
Hours of work now seconds in Fletch | 2024 Product Updates
Prioritize your alerts. Get ahead of the ones coming. Rinse and repeat. Experience Fletch’s artificial intelligence with our new Alert Prioritizer and Threat Forecaster.
Product
February 27, 2024
Kenisha Liu
/
The problem with threat detection
Every company needs threat detection to proactively defend against threats & minimize impact. Unfortunately, threat detection solutions today… leave a lot to be desired.
Articles
February 07, 2024
Kenisha Liu
/
What is threat detection
At its core, threat detection is the practice of identifying and responding to potential cybersecurity threats before they can cause harm. Let's dive in.
Articles
January 31, 2024
Kenisha Liu
/
The problem with vulnerability management
The problem with today’s vulnerability management is a lack of context, leaving teams to wade through 1000’s of alerts indiscriminately. Here’s how to fix it.
Product
January 09, 2024
Kenisha Liu
/
Fletch Getting Started Guide
With Fletch you’ll live ahead of cyberthreats by discovering & prioritizing your threats better than traditional platforms. Let’s break down how to get started.
Product
December 19, 2023
Kenisha Liu
/
Automate your threat research & correlation work | 2023 Product Updates
This month’s Threat Boards update has a fresh new look, correlation specifics on data and people, complete IOCs for each threat, + more
Product
December 11, 2023
Kenisha Liu
/
What is vulnerability management
Vulnerability management is a critical component of cybersecurity to address cybersecurity vulnerabilities in a company’s organization. Let’s dive into what vulnerability management is.
Articles
December 05, 2023
Kenisha Liu
/
Prioritize malware & vulnerability alerts in seconds + discover threats earlier | 2023 Product Updates
Fletch’s latest update eliminates the noise and focuses you on the few threats you need to know everyday, already prioritized for you. See what’s new in our latest 2023 product updates.
Product
November 18, 2023
Kenisha Liu
/
The early warning system for Microsoft
Get early threat detection when you connect Fletch to the Microsoft products you already own. Then use Fletch to know exactly how to fix them.
Product
September 30, 2023
Kenisha Liu
/
What is Fletch?
Fletch allows you to live ahead of the cyber threats that matter to you. Learn more about how we tell you the threats you’re at risk for based on your susceptibility.
Articles
September 11, 2023
Kenisha Liu
/
Fletch named ‘Top 100 Early Stage Company to Work For in 2023’
Out of 2,500+ eligible Seed and Series A B2B tech companies, Fletch is named a Top 100 early-stage company shaping the future of workplace culture by Will Reed.
News
September 07, 2023
Kenisha Liu
/
Meet the Fletch Experts: How human expertise elevates AI potential
How does human expertise enhance AI potential? Meet Fletch's experts whose partnership with artificial intelligence is the key to our timely and reliable insights.
Articles
August 24, 2023
Kenisha Liu
/
What are Correlated Threats?
Correlated Threats is your data correlated with active threats, simplifying the threat landscape to only what matters.
Product
August 18, 2023
Kenisha Liu
/
Why use Single Sign On (SSO)
Single Sign On reduces the risk of data breaches by enforcing strong password policies. In this article, we will explore the history of Single Sign On to understand why it’s so important, common concerns of SSO and how to address them, and the many benefits of SSO.
Articles
August 11, 2023
Kenisha Liu
/
What are Major Threats?
Fletch’s Major Threats cuts out the manual work and automatically gives you only the threats that matter right now based on the collective wisdom of the cybersecurity community
Product
August 02, 2023
Kenisha Liu
/
Correlate your data to the entire threat landscape
Fletch is more than an early warning system for threats. Learn more about how Fletch gives you visibility into the cyberthreats you never could have before.
Product
July 24, 2023
Kenisha Liu
/
What is Single Sign On? And how does Single Sign On work
Single Sign-On (SSO) is a technology that simplifies the login process by allowing users to access multiple applications or websites with just one set of login credentials. But how does Single Sign-On work? In this article, we will explore the fundamentals of Single Sign-On and delve into the benefits it offers.
Articles
July 13, 2023
Kenisha Liu
/
Use SSO Connection with Fletch to secure your organization
By seamlessly integrating your SSO data with our cutting-edge threat intelligence platform, you take the first step to gaining unparalleled visibility and a comprehensive understanding of the threat landscape.  In this article, we will explore what it means to connect your SSO data to Fletch and the myriad of benefits.
Product
July 06, 2023
Kenisha Liu
/
Introducing the new Fletch Threat Board
Introducing the new Fletch Threat Boards - the ultimate solution for comprehensive threat analysis. Get unparalleled insights into each threat, from its nature to prevention strategies, all at your fingertips. No more relying on multiple resources or expensive tools. Read for more information and features below.
Product
June 20, 2023
Kenisha Liu
/
Press Coverage
All the latest news, press releases, and media coverage featuring Fletch.
News
May 03, 2023
Introducing the new Fletch Feed
Introducing the Fletch Feed! In a 30 second glance, know the threats that matter to you, 7 to 10 days before the news. The Fletch Feed organizes what’s important so you can focus on what matters every day.
Product
May 02, 2023
Lisa Fong
/
The Threat Show! Changing role of CISO with Peter Schawhacker
Welcome to The Threat Show powered by Fletch. This week we break down major threats you need to know about if you’re using Apple devices, SQLite, or Microsoft Azure. Host Robert Wagner interviews Peter Schawhacker, a cybersecurity veteran of a quarter century, about the changing role of CISO and where things are headed.
Articles
November 02, 2022
Robert Wagner
/
The Threat Show 10/21/2022
🔥Welcome to the weekly threat show!🔥 In this series, Robert and Darien with our guest speaker, Chris Wilder from TAG Cyber discuss the top trending threats and how it can affect your team.
Articles
October 21, 2022
Robert Wagner
/
The Threat Show! 10/14/2022
As Halloween draws near, cyber ghosts from the past are stirring up plenty of fright among security teams. You’ll want to tune in if you use Microsoft Exchange, Fortinet, or Zimbra. Plus, POLONIUM tries to take everyone’s candy with creepy malware. This week we’ve got a bonus for you! We round out our episode with special guest Chris Wilder from TAG Cyber discussing the ethics of critical cybersecurity information disclosure.
Articles
October 17, 2022
Robert Wagner
/
The 5 Best Open-Source Tools for Creating a Forensic Disk Image
In computer forensics and data analysis, a forensic image is an exact snapshot of the state of a drive or partition at a given point in time. This snapshot preserves details that aren’t visible to most users, such as file access times and last modified dates. These details become critical in the analysis process, allowing investigators to identify when and how files were accessed by different users.
Articles
October 17, 2022
Robert Wagner
/
5 Steps to Secure Your Mid-Market Enterprise with Multi-Factor Authentication
Cybersecurity is increasingly top of mind among owners and employees of small and medium sized enterprises—and for good reason. In fact, about a quarter of all workers have fallen victim to a cybercrime; and according to the 2022 Verizon Data Breach Investigations Report, close to 50% of breaches were due to compromised credentials. Here’s the kicker: Small businesses are three times more likely to be targeted by cybercriminals than larger companies.
Articles
October 10, 2022
Robert Wagner
/
Remediation without the Guesswork
This week we dive into remediation and all the things you’ll do to address a threat that’s impacting you. If you’re using the Fletch Trending Threats app, you’re starting to get a handle on major threats that could impact your organization. So, what now?
Articles
September 30, 2022
Robert Wagner
/
Staying Ahead of Cybersecurity Threats
Last week, we talked about getting ahead of cybersecurity threats, discussing traditional approaches to this problem, and how Fletch makes it all a lot easier. Now, once you have a strategy for getting ahead of those threats, you're going to want to stay ahead of them. That's where teams run into a lot of hurdles. It's a real challenge. There's a lot of different types of threats covered by media outlets, social media channels, and even cybersecurity publications. It’s hard to figure out what to prioritize for most organizations.
Articles
September 26, 2022
Robert Wagner
/
Getting Ahead of CyberThreats
Getting and staying ahead of CyberThreats is the #1 job of any security team. Reading the backwaters of the internet, figuring out what threats matter before they hit the headlines, if those threats impact you, and staying on them as they emerge and evolve is a task that takes a small army. The top issue is, you need to know about the major emerging threats before they hit the headlines. By the time a threat gets written up in Forbes; you're in reactive mode.
Articles
September 16, 2022
Robert Wagner
/
Insider Threat: Technical Tools for Mitigation and Digital Forensics
Next in our series on Insider Threat, we'll discuss the technical tools organizations can use to mitigate risk, as well as begin an investigation. This article details the most effective insider threat mitigation techniques and digital forensics resources that are accessible to small and mid-sized companies without a lot of technical knowledge. We can break these down into four categories: The Basics, Monitoring, Advanced Strategies, and Digital Forensics.
Articles
September 09, 2022
Robert Wagner
/
Insider Threat Mitigations: People and Process
We've talked about the basics of establishing an Insider Threat Program in a previous article. And while technology will always be a key component to a successful insider risk program, the best place to start your program is with people and process. This is especially true if you have a small budget for security, since changes that leverage your people and processes are often the most cost-effective, and can have the greatest impact.
Articles
September 01, 2022
Robert Wagner
/
Insider Threat Programs: How to Keep Your Small-Medium Enterprise Secure
An insider threat program will help you protect your confidential data and operational security, as well as comply with industry regulations. It will allow you to identify and mitigate risk posed by internal employees who could cause harm to a business.
Articles
August 29, 2022
Robert Wagner
/
Trending Threats Spotlight - How Fletch Uses EDR Data
Articles
August 19, 2022
Robert Wagner
/
Fletch Weekly Digest- 08/15/22
Fletch Weekly Digest Threats Spotlight and Trending Threats of the Week
Newsletter
August 16, 2022
Christina Changco
/
Trending Threats Spotlight - How Fletch Uses Vulnerability Data
Articles
August 15, 2022
Robert Wagner
/
Simplifying Insider Risk Investigations with Fletch
Today’s businesses are now operating in a more challenging digital landscape with threats of hackers, viruses, and insider cyber attackers lurking around every corner. These insider threats can be generally categorized as malicious insiders or non-malicious insiders who unintentionally expose confidential information.
Articles
July 31, 2022
Enhancing Threat Analytics with Security Indicators
For Threat intelligence to be most effective, your organization needs threat intel that is informed by security indicators derived from your own security tools.
Articles
July 15, 2022
Robert Wagner
/
Trending Threats Selection Criteria
Articles
July 08, 2022
Robert Wagner
/
Using Authentication Logs to Uncover Insider Risk in Productivity Suites and SSO Providers
Insider threat poses a unique challenge to security teams because the risks are so much more nuanced than external attackers, who tend to be malicious and easily identified. Insider threats often result from an employee falling victim to their own tendencies or naivety rather than a malicious attack. Examples range from someone being offered a bribe by an attacker posing as a supplier for sensitive information, to an employee clicking on a link in an email that appears innocuous but is actually malware installed by the attacker. Authentication logs can reveal insider threat red flags that might not have been visible in any other way.
Articles
July 01, 2022
Robert Wagner
/
Navigating Vulnerability Management and Endpoint Detection & Response (EDR) Products
If you’re new to cybersecurity or are looking for tools to protect your organization, we’ve created this guide to help you navigate two staple categories of products most small to medium-sized enterprises (SMEs) should have in their security operations arsenal: vulnerability management and endpoint detection and response (EDR) products.
Articles
March 17, 2022
Weekly Threat Pulse (2/15)
Here are the top 5 trending cyber threats from last week.
Newsletter
February 01, 2022
Weekly Threat Pulse (2/8)
Here are the top 5 trending cyber threats from last week.
Newsletter
February 01, 2022
Weekly Threat Pulse (2/1)
Here are the top 5 trending cyber threats from last week.
Newsletter
February 01, 2022
Weekly Threat Pulse (1/25)
Here are the top 5 trending cyber threats from last week.
Newsletter
January 25, 2022
Weekly Threat Pulse (1/18)
Here are the top 5 trending cyber threats from last week.
Newsletter
January 18, 2022
Weekly Threat Pulse (1/12)
Weekly Threat Pulse (1/12)
Newsletter
January 12, 2022
Weekly Threat Pulse (1/4)
Here are the top 5 trending cyber threats from last week.
Newsletter
January 04, 2022
Weekly Threat Pulse (12/21)
Here are the top 5 trending cyber threats from last week.
Newsletter
December 21, 2021
Weekly Threat Pulse (12/15)
Here are the top 5 trending cyber threats from last week.
Newsletter
December 15, 2021
The Fletch Insider Risk App
Who in my company isn’t acting like themselves? Could they be a security risk?” Stop insider threats and ransomware with the Fletch Insider Risk app.
Product
December 14, 2021
Why Fletch and the App Model?
Fletch’s app model solves the complex problem of cyber security analytics, enabling SMEs and underserved security teams to finally have a fighting chance to be secure.
Product
December 13, 2021
Weekly Threat Pulse (12/7)
Here are the top 5 trending cyber threats in the news last week.
Newsletter
December 10, 2021
Partner Programs at Fletch
With Fletch, consultants and cybersecurity service providers can open new revenue streams by solving the complex problem of cybersecurity analytics, enabling SMEs (Small and medium enterprise) and underserved security teams to finally have a fighting chance to be secure.
Partners
December 06, 2021
Weekly Threat Pulse (11/30)
Here are the top 5 trending cyber threats in the news last week.
Newsletter
November 30, 2021
Fletch Frequently Asked Questions
Is your Google token not working? Not receiving Fletch emails? Check out our FAQ page for answers.
Product
November 18, 2021
Weekly Threat Pulse (11/16)
Here are the top 5 trending cyber threats in the news last week.
Newsletter
November 12, 2021
Weekly Threat Pulse (11/09)
Here are the top 5 trending cyber threats in the news last week.
Newsletter
November 12, 2021
Introducing Trending Threats from Fletch
Fletch's Trending Threats solution helps security teams prioritize efforts and stay ahead of cybercriminals in an ever-changing threat landscape.
Product
September 30, 2021
The Fletch Press: Can we eliminate the need for security?
The Fletch Press Issue 4: Exploring a passwordless world, ID’ing your vendors on the defense matrix, and theorizing future frameworks that eliminate the need for security.
Newsletter
September 24, 2021
The Fletch Press: The X-Factor you didn’t know you needed
The Fletch Press Issue 3: Finding the best security hire, breaking into infosec, and easing your way into transitioning to the cloud.
Newsletter
September 08, 2021
Hiring in Cybersecurity
Cybersecurity job postings are too rigid in their requirements. Repositioning or re-tooling workers from other roles, such as help desk or network engineering, and searching for the “X-Factor” will alleviate the talent shortage.
Webinar
September 01, 2021
The Fletch Press: Rejecting “BlackBox” Security
The Fletch Press Issue 2: Paving the way toward a new mindset and collective openness to security, tell-tale signs of an insider threat, and what to do when you've been breached.
Newsletter
August 26, 2021
The Future of Security: Transparency and Affordability
Security today isn’t up to standard, is too costly and lacks openness and transparency, so many business leaders have difficulty understanding its value. Cybersecurity startups pave the path toward a new mindset and openness to security.
Webinar
August 16, 2021
The Fletch Press: You don’t have to secure everything…
The Fletch Press Issue 1: Classifying data based on sensitivity, evaluating the impact of the cybersecurity talent shortage, and securing your organization as a healthcare leader.
Newsletter
August 12, 2021
The Fletch Press: Cybersecurity is chaotic. We’re here to help.
The Fletch Press Welcome Issue: Introducing our biweekly newsletter, guiding SMBs through security, and addressing the talent gap.
Newsletter
July 29, 2021
How Small and Medium-Sized Businesses Can Achieve Peace of Mind When it Comes to Cybersecurity
Small-to-medium-sized businesses (SMBs) are frequent targets of data breaches. Traditional cybersecurity tools exclude SMBs as they are expensive and require technical expertise. New technologies will mitigate risks for cloud-based SMBs.
Articles
July 19, 2021
Automate Evaluating the Impact of Emerging Cyber Threats with Fletch
Fletch lets you know instantly whether or not you’re at risk when a cyber threat emerges in the news using natural language search and data triangulation.
Product
July 08, 2021
Automate Solving the Most Common Cloud-Based Cybersecurity Needs with Fletch
Fletch automates detecting insider threats, monitoring cloud controls, and evaluating the impact of emerging threats on your environment.
Product
July 02, 2021
How to Automatically Detect and Mitigate Insider Threats
Are you ready to instantly detect and protect your organization against insider threats? It only takes one rogue employee or a single account compromise to result in a data breach.
Product
June 30, 2021
Introducing Fletch
Fletch is solving the most common cybersecurity needs for cloud-first companies and those migrating to the cloud. Insider threat detection, monitoring cloud posture and risk, and assessing emerging threats and how they impact your environment--Fletch has you covered!
Product
June 28, 2021
Automated Insider Threat Detection for G Suite & MS 365
Protect against insider threats and risks through instant visibility into critical abnormal user and entity behavior. 15-minutes to start. 1-month trial (money back guarantee if not satisfied), then $1 / user account / month.
Product
June 21, 2021
Why are Hackers Targeting the Healthcare Industry?
Cybercriminals have accelerated attacks on healthcare since the sector adopted cloud-based applications during the pandemic. Modernized software and remote patient care require security upgrades.
Articles
June 21, 2021
Addressing the Cybersecurity Talent Gap
The cybersecurity talent shortage is not a solvable problem without re-tooling and automation. The industry must embrace a low-code movement to hire talent based on curiosity and critical thinking ability to make cybersecurity more inclusive overall.
Articles
June 14, 2021
Colonial Pipeline CEO Addresses Cyberattack at Senate Hearing: What You Need to Know
As hackers increasingly target critical infrastructures, the US government urges private companies to improve their cyber hygiene and transparency in their notifications of breaches.
Articles
June 11, 2021
The Evolution of Cybersecurity and the No-Code Movement
Cybersecurity originated to protect systems against hackers. In Gen 2, it was scaled for new but complex products. Take a deep dive with Daniel Frye, CEO at Rocketansky, and Grant Wernick, CEO at Fletch, for a glimpse at what's coming in Gen 3!
Webinar
June 10, 2021
Learnings on Healthcare & Cybersecurity
Healthcare has a lot of issues right now, but what are the most important cybersecurity ones? What are ways to keep patient and staff data secure and hackers out? Let’s discuss. Here’s what I learned recently.
Articles
June 02, 2021
The Urgent Need for Diversity and Inclusion in Cybersecurity
To address its glaring talent shortage, the cybersecurity industry needs to re-tool and implement software with better automation. Ready-to-use data analysis tools would allow for more diverse hires and help foster a more inclusive culture.
Articles
June 01, 2021
User Behavior Analysis Across Productivity Tools
Fletch’s User Behavior Analysis solution includes five boards that help security teams monitor and discover risky and anomalous behavior. The short videos below explain the importance of each User Behavior Analysis board with further clarification of the specific behavior types being monitored.
Product
May 27, 2021
The Hierarchy of SaaS
To secure SaaS applications, first classify your data by level of sensitivity: Low sensitivity, moderate sensitivity, high sensitivity, and restricted. Then, prioritize locations to monitor based on where your most sensitive data lives.
Articles
May 24, 2021
What To Do When You Have An Insider Threat
Whether it’s an employee whose account is compromised, a malicious employee, or a negligent third party, insider threats can be very damaging to a company. Practicing good hygiene and using more automated tools will mitigate risk.
Articles
May 18, 2021
5 Things to Consider When Transitioning to the Cloud
While moving to the cloud helps businesses gain more efficiency and scalability, it can come at a cost when not done right. We’ve laid out five guidelines to follow to ensure a smooth transition to the cloud.
Articles
May 12, 2021
User Behavior Analytics: Evolution and Challenges
User Behavior Analytics, or UBA, is a widespread tool that businesses use to protect their data and reputation. UBA solutions can improve in terms of transparency, reliability, and accessibility and will soon integrate natural language processing to best support security efforts and mitigate costs.
Articles
May 04, 2021
Why cyber threats are increasing and what you can do about it
The world is moving at the speed of code, and unfortunately, cybercriminals are evolving and innovating their attacks faster than security teams can detect, patch, or stop them. Organizations must understand why emerging cyber threats continue to rise and the business consequences of not addressing them in a timely manner.
Product
April 26, 2021
How To Scale SOC 2 Compliance Across Cloud Apps
Achieving SOC 2 compliance not only assures your current and prospective customers that you are securing and protecting their data, but it is also a best practices framework that helps improve your organization’s security in a consistent and predictable manner.
Product
April 21, 2021
Ready-to-use analytics and why we need them now more than ever
Ready-to-use analytics empowers operators, leaders, analysts, the technical and the non-technical in every organization by making data approachable and easy to understand, and we need them now more than ever.
Product
April 07, 2021
Grant Wernick
/
Solving User Behavior Analytics with Fletch
Cybersecurity teams now have the power of Fletch’s ready-to-use user behavior analytics so they can monitor user activity across their cloud and SaaS application data, identify abnormalities, and know how to stop insider threats before they happen.
Product
March 22, 2021
Under Gathering Clouds, IT Holds Umbrella
In an age of cyber-threat, all departments need open channels to key IT staff. Cybersecurity should be a whole chapter, not merely a footnote, in the company’s strategic conversation.
Articles
February 10, 2021
Grant Wernick
/
Mo’ Data, Mo’ Problems
What’s the purpose of data? To extract insights of value to your company. But not all data accomplishes this goal; hoarding data weighs you down.
Articles
February 08, 2021
Grant Wernick
/
A Marie Kondo Approach to Data Analytics
All data has the potential to hold value, especially as everyone moves to the cloud and machine learning gets more advanced. But it also has the potential to waste space.
Articles
January 19, 2021
Grant Wernick
/
Solving the Big Data, Small Returns Problem in 2020 - Part 2
And as far as getting value from data, we need to put the human element back into analytics. The analytics will only be as good as the person that asks challenging questions. That person should not have to have a technical background to do so. We need to enable those who are curious and want to explore their data freely and adventurously.
Articles
January 16, 2021
Grant Wernick
/
Black Hat, White Noise
The innovation to noise ratio is higher now than any other point in time in the industry. Noise isn’t necessarily a bad thing. It means the industry is hot and people are excited to toss their hats in the information security ring.
Articles
January 15, 2021
Grant Wernick
/