Categories: Threat Intelligence

FUSE 2025: Empowering Security Leaders to Leverage Flashpoint Intelligence Against Emerging Threats

Last week, Flashpoint welcomed hundreds of customers, partners, and industry leaders to FUSE 2025, our annual user conference. This event was an intensive two-day virtual summit dedicated to educating attendees about the latest developments in the threat landscape and sharing Flashpoint’s vision for combating these challenges. Participants had the opportunity to engage with world-class peers, sharing real-life case studies, workflows, and best practices. The focus was on leveraging Flashpoint’s AI-powered solutions in tackling some of the world’s most complex cybersecurity threats.

While we can’t share every detail from FUSE, here are four key themes shaping how leading security experts operationalize Flashpoint intelligence.

Takeaway #1: AI Is Now a Tested Force Multiplier for Human Analysts

The message resonating through the conference was clear: generative AI has emerged as a crucial ally for global security teams, extending human judgment rather than replacing it. Organizations have transitioned from theoretical discussions about AI tools to practical applications, particularly utilizing Flashpoint Ignite’s suite of AI-powered features:

  • Ignite AI: Rapidly condenses vast search results from illicit communities, highlighting key TTPs (Tactics, Techniques, and Procedures), actors, and trends within moments.
  • Echosec AI: Analyzes extensive social media data, providing users with valuable summaries, sentiment analysis, and relevant search term recommendations.
  • Echosec Assist: A conversational chatbot designed with the last month of data, enabling analysts to inquire, verify sources, and pivot seamlessly within OSINT workflows.
  • AI Image Search: A groundbreaking tool that allows natural language searches through visual data, transforming images into actionable intelligence.

An engaging case study shared at FUSE illustrated how a major US retailer utilized AI for such investigations. Analysts identified an illicit Telegram channel that was selling stolen gift cards. They pinpointed an important piece of evidence: an image of a card clearly showing the asset number. With Flashpoint’s AI Image Search, the security team rapidly traced the source of the stolen asset, unveiling a sophisticated, multinational fraud operation.

Takeaway #2: OSINT Is a Bridge, Securing People and Assets from Digital Threats

In today’s digital environment, open-source intelligence (OSINT) has become an essential bridge between the physical and cyber threat landscapes. It plays a vital role in translating online hostility—such as harassment, radicalization, and threats—into tangible physical risks.

Throughout the conference, industry leaders demonstrated how their organizations use OSINT workflows, enhanced by Flashpoint intelligence, to manage millions of threats annually aimed at people, assets, and brands. OSINT has become a cornerstone for proactive executive protection and has accelerated financial fraud investigations by linking digital signals to real-world threats.

A compelling example was presented by the Community Security Initiative of New York (CSI-NY), which shared how they used our Echosec platform. They detected a credible social media threat against a synagogue in Manhattan. Armed with real-time OSINT, they conducted in-depth research on the suspect, confirming the threat’s credibility and alerting law enforcement, who apprehended the suspect just hours before services.

Takeaway #3: Infostealers are the Backbone of the Ransomware Economy

In the realm of cybercrime, information-stealing malware has risen to prominence. In just the first half of 2025, infostealers were linked to the heist of over 1.8 billion credentials, encompassing corporate cookies, passwords, and sensitive data. Crucially, data from the 2025 Verizon DBIR underscored a significant correlation: 54% of organizations struck by ransomware were also found in infostealer logs, highlighting the direct financial pipeline from compromised credentials to more intricate attacks.

To defend effectively, organizations require intelligence that keeps pace with ever-evolving market trends. During a special FUSE session, analysts outlined how Flashpoint meticulously tracks over 30 unique infostealer families, shedding light on the methodologies of the most prolific strains and suggesting proactive defense strategies using compromised credentials datasets.

Takeaway #4: Flashpoint Is Filling the Gap in Publicly Sourced Vulnerability Intelligence

The realm of vulnerability intelligence is evolving at a dizzying pace, with January 2025 reaching a record peak of 4,300 vulnerabilities. Despite Flashpoint documenting over 24,000 vulnerabilities within the year, public sources of vulnerability intelligence appear to be falling short.

Notably, the Common Vulnerabilities and Exposures (CVE) database and the National Vulnerability Database (NVD) are facing significant disruptions in coverage, leaving innumerable exploitable vulnerabilities hidden from vulnerability management teams that rely on them. To bridge this critical gap, Flashpoint emphasized how clients can enhance their defense strategies by leveraging tools like VulnDB and the FP KEV.

Join Us for Next Year’s FUSE

FUSE 2025 underscored that operationalizing smarter, contextualized data is the future of impactful threat intelligence. Common threads from the sessions—including the rise of AI as a force multiplier for analysts and the necessity of integrating physical and cyber domains—revealed that organizations must adapt rapidly to stay ahead of the evolving threat landscape.

Flashpoint is dedicated to delivering exclusive insights into this shifting threat environment, the latest developments in intelligence collection, and cutting-edge AI solutions that can significantly enhance security teams’ capabilities. By utilizing Flashpoint intelligence, your organization can gain a deeper understanding of, prioritize, and effectively combat the risks that matter most. Ready to elevate your security measures? Request a demo today and be part of next year’s FUSE 2026.

James

Recent Posts

AI in Everyday Life: How Artificial Intelligence Is Shaping Your Daily Routine

Artificial Intelligence (AI) is no longer a futuristic concept—it’s already embedded in our everyday lives.…

1 day ago

Security Best Practices: How to Protect Your Digital Life in 2026

In today’s hyper-connected world, cybersecurity is no longer just an IT concern—it’s a personal responsibility.…

1 day ago

Crypto Security & Scams: How to Protect Your Digital Assets in 2026

The rise of cryptocurrency has opened up new financial opportunities—but it has also attracted a…

1 day ago

AI in Cybersecurity: How Artificial Intelligence Is Transforming Digital Security in 2026

As cyber threats become more advanced and frequent, traditional security methods are no longer enough.…

3 days ago

Blockchain Technology Explained: How It Works and Why It Matters in 2026

Blockchain technology has evolved from powering cryptocurrencies to becoming a foundational system for secure, transparent,…

3 days ago

Tech Startups in 2026: Trends, Opportunities, and How to Build a Successful Startup

The tech startup ecosystem is evolving faster than ever. With rapid advancements in artificial intelligence,…

3 days ago