Categories: Threat Intelligence

FUSE 2025: Empowering Security Leaders to Leverage Flashpoint Intelligence Against Emerging Threats

Last week, Flashpoint welcomed hundreds of customers, partners, and industry leaders to FUSE 2025, our annual user conference. This event was an intensive two-day virtual summit dedicated to educating attendees about the latest developments in the threat landscape and sharing Flashpoint’s vision for combating these challenges. Participants had the opportunity to engage with world-class peers, sharing real-life case studies, workflows, and best practices. The focus was on leveraging Flashpoint’s AI-powered solutions in tackling some of the world’s most complex cybersecurity threats.

While we can’t share every detail from FUSE, here are four key themes shaping how leading security experts operationalize Flashpoint intelligence.

Takeaway #1: AI Is Now a Tested Force Multiplier for Human Analysts

The message resonating through the conference was clear: generative AI has emerged as a crucial ally for global security teams, extending human judgment rather than replacing it. Organizations have transitioned from theoretical discussions about AI tools to practical applications, particularly utilizing Flashpoint Ignite’s suite of AI-powered features:

  • Ignite AI: Rapidly condenses vast search results from illicit communities, highlighting key TTPs (Tactics, Techniques, and Procedures), actors, and trends within moments.
  • Echosec AI: Analyzes extensive social media data, providing users with valuable summaries, sentiment analysis, and relevant search term recommendations.
  • Echosec Assist: A conversational chatbot designed with the last month of data, enabling analysts to inquire, verify sources, and pivot seamlessly within OSINT workflows.
  • AI Image Search: A groundbreaking tool that allows natural language searches through visual data, transforming images into actionable intelligence.

An engaging case study shared at FUSE illustrated how a major US retailer utilized AI for such investigations. Analysts identified an illicit Telegram channel that was selling stolen gift cards. They pinpointed an important piece of evidence: an image of a card clearly showing the asset number. With Flashpoint’s AI Image Search, the security team rapidly traced the source of the stolen asset, unveiling a sophisticated, multinational fraud operation.

Takeaway #2: OSINT Is a Bridge, Securing People and Assets from Digital Threats

In today’s digital environment, open-source intelligence (OSINT) has become an essential bridge between the physical and cyber threat landscapes. It plays a vital role in translating online hostility—such as harassment, radicalization, and threats—into tangible physical risks.

Throughout the conference, industry leaders demonstrated how their organizations use OSINT workflows, enhanced by Flashpoint intelligence, to manage millions of threats annually aimed at people, assets, and brands. OSINT has become a cornerstone for proactive executive protection and has accelerated financial fraud investigations by linking digital signals to real-world threats.

A compelling example was presented by the Community Security Initiative of New York (CSI-NY), which shared how they used our Echosec platform. They detected a credible social media threat against a synagogue in Manhattan. Armed with real-time OSINT, they conducted in-depth research on the suspect, confirming the threat’s credibility and alerting law enforcement, who apprehended the suspect just hours before services.

Takeaway #3: Infostealers are the Backbone of the Ransomware Economy

In the realm of cybercrime, information-stealing malware has risen to prominence. In just the first half of 2025, infostealers were linked to the heist of over 1.8 billion credentials, encompassing corporate cookies, passwords, and sensitive data. Crucially, data from the 2025 Verizon DBIR underscored a significant correlation: 54% of organizations struck by ransomware were also found in infostealer logs, highlighting the direct financial pipeline from compromised credentials to more intricate attacks.

To defend effectively, organizations require intelligence that keeps pace with ever-evolving market trends. During a special FUSE session, analysts outlined how Flashpoint meticulously tracks over 30 unique infostealer families, shedding light on the methodologies of the most prolific strains and suggesting proactive defense strategies using compromised credentials datasets.

Takeaway #4: Flashpoint Is Filling the Gap in Publicly Sourced Vulnerability Intelligence

The realm of vulnerability intelligence is evolving at a dizzying pace, with January 2025 reaching a record peak of 4,300 vulnerabilities. Despite Flashpoint documenting over 24,000 vulnerabilities within the year, public sources of vulnerability intelligence appear to be falling short.

Notably, the Common Vulnerabilities and Exposures (CVE) database and the National Vulnerability Database (NVD) are facing significant disruptions in coverage, leaving innumerable exploitable vulnerabilities hidden from vulnerability management teams that rely on them. To bridge this critical gap, Flashpoint emphasized how clients can enhance their defense strategies by leveraging tools like VulnDB and the FP KEV.

Join Us for Next Year’s FUSE

FUSE 2025 underscored that operationalizing smarter, contextualized data is the future of impactful threat intelligence. Common threads from the sessions—including the rise of AI as a force multiplier for analysts and the necessity of integrating physical and cyber domains—revealed that organizations must adapt rapidly to stay ahead of the evolving threat landscape.

Flashpoint is dedicated to delivering exclusive insights into this shifting threat environment, the latest developments in intelligence collection, and cutting-edge AI solutions that can significantly enhance security teams’ capabilities. By utilizing Flashpoint intelligence, your organization can gain a deeper understanding of, prioritize, and effectively combat the risks that matter most. Ready to elevate your security measures? Request a demo today and be part of next year’s FUSE 2026.

James

Share
Published by
James

Recent Posts

Former Meta and Google Employee Leaves to Launch AI Startup, Offers Insights

From Tech Giants to Entrepreneurship: Jason White's Journey A Transition in Focus In the rapidly…

1 week ago

The Emergence of Smaller ‘Meek Models’ May Democratize AI Systems

Rethinking AI: The Shift Towards Resource-Efficient Models AI has revolutionized various sectors by providing innovative…

1 week ago

The Growing Importance of Newswires in the Era of Generative AI: Insights from Furia Rubel Communications, Inc.

The Evolving Role of Newswires in the World of Generative AI In today’s fast-paced digital…

1 week ago

FLORA Secures $42M to Integrate AI Solutions for Creatives: Pitch Deck

FLORA: Reshaping the Creative Industries with AI In a world where artificial intelligence (AI) is…

1 week ago

2026: A Guide to Tutorials and Applications

The Role of ChatGPT in Streamlining Web Scraping Introduction to ChatGPT and Web Scraping ChatGPT,…

1 week ago

Clawdbot AI Assistant: Overview and How to Get Started

Clawdbot: The Open-Source AI Personal Assistant Taking the Internet by Storm Interest in Clawdbot, the…

1 week ago