Abhilash Garimella
According to research by the Aite Group, financial institutions are facing a 64% uptick in account takeover attacks than before the pandemic. This number is expected to rise further as the digital ecosystem expands, enlarging the surface area culpable to attack. Account takeover fraud is one of the most common fraud types, and institutions must… Continue reading Account takeover fraud: 5 steps for protecting your customers
When researchers from Armorblox discovered a phishing attack from bad actors impersonating the well-known security company Proofpoint, it set off alarm bells for a lot of organizations and security teams that weren’t actively safeguarding against phishing attacks. These criminals targeted a global communications company with over 1,000 employees with a phishing email containing a link… Continue reading Real-world Phishing Attack Highlights Why Every CISO Needs to Protect Against Brand Impersonation
YOLO refers to the paper published in May 2016. The YOLOv5, a version of the model in the You Only Look Once (YOLO) family of computer vision models, is on Pytorch and all the previous models used the darknet implementation. Our goal is to use the YOLO for logo detection, even though there’s still some debate… Continue reading Logo Detection Using Yolo v5 and Pytorch
Every year, Bolster research labs not only finds a spike in online shopping activity during the holidays but also a surge in fraud and scams. This is one of the toughest times for online brands because a large portion of their yearly revenue relies on maintaining business continuity during this season. Because consumers are shopping… Continue reading Top 5 Ways to Protect Customers this Holiday Season
Introduction Before we jump into the world of subdomain hijacking/ takeover, let’s try and understand what a subdomain is: A subdomain is an extension to your primary domain name. It helps you organize the content of your websites into different sections. Think of it as a folder with subfolders on your laptop to organize your… Continue reading Subdomain Hijacking: How to identify subdomains at risk in 2023
Online Fraud is off the Charts – See For Yourself You’ve heard us say it before, and we’ll say it again, online fraud represents a tremendous threat to businesses and brands of all sizes. The scale of the problem is mind-boggling, and with so many different digital channels to contend with from websites to social… Continue reading Bolster Global Fraud Index Now Live!
Log4j zero-day vulnerability has the Internet in a race against the clock The Internet is in a frenzy racing against the clock with patches to protect against the latest zero-day Internet vulnerability. The vulnerability is tied to a flaw in Log4j (also now known as “Log4Shell”), a Java library for logging error messages in applications.… Continue reading Log4j – The facts behind the latest zero-day Internet vulnerability
Microsoft recently secured a court order to takedown ‘homoglyph’ domains that impersonate one of their brands. In a statement they released on July 19, they said that these imposter domains were targeting Office 365 customers. This court order is a huge win! Not just for Microsoft, but the entire cybersecurity industry. In this blog, we… Continue reading What Every CISO Should Do to Fight Typosquat Attacks
Before we get started, there are a couple of terms I would like to introduce: Typosquatting domains: Typosquatting domains are lookalike domains targeting a brand. They look very similar to the brand’s legitimate domain and are hard to tell apart. For example, rarible[.]com is the legitimate website of the famous NFT marketplace Rarible. rarbile[.]com is… Continue reading NFT Scams Part 2: Typosquatting Attacks targeting NFT marketplace users
Non-fungible tokens, famously known as NFTs have become the latest phenomenon. People around the globe are paying millions of dollars (in crypto) for NFT art and collectibles. If you were a crypto nerd, the explosion of NFTs onto the global stage and mainstream media would not have come as a surprise. These tokens have been… Continue reading NFT Scams Part 1: 5 NFT Scams you need to know