According to a recent LinkedIn post from Flare, the company is highlighting new research on infostealer malware trends and enterprise identity risk. The post cites analysis of 18.7 million stealer logs by a Flare threat intelligence researcher, indicating that overall infostealer infections reportedly fell 20% in 2025 while the proportion yielding enterprise single sign-on credentials rose from 6% to nearly 14%.
Meet Samuel – Your Personal Investing Prophet
- Start a conversation with TipRanks’ trusted, data-backed investment intelligence
- Ask Samuel about stocks, your portfolio, or the market and get instant, personalized insights in seconds
The post indicates that about 2.05 million of the logs examined contained enterprise identity credentials, implying that roughly one in ten infections may now provide corporate access. It also notes that Microsoft Entra ID appeared in 79% of enterprise identity logs and that 1.17 million logs allegedly included both credentials and session cookies, which the post suggests could enable multi-factor authentication bypass.
Flare’s post further suggests that, if current patterns persist, as many as one in five infections could compromise enterprise access by Q3 2026. The company is using these findings to promote a live session in which the researcher plans to discuss a “model validation gap” and what is described as a new phase of attacker efficiency, positioning Flare as an active commentator on evolving identity security risks.
For investors, the content points to growing demand for advanced threat intelligence and identity security capabilities as enterprises grapple with more efficient credential theft despite fewer infections. If Flare can translate this research visibility into product adoption or higher-value services, it may strengthen its competitive position in cyber threat intelligence and identity security markets, though monetization and differentiation versus larger incumbents remain key uncertainties.

