Bolster Research
Recent years have seen a rise in high-profile incidents involving hacking and scamming in the cryptocurrency market, resulting in millions of dollars in losses for investors in 2022 alone. These events have led to concerns about the security and stability of the crypto market and have caused many to question the safety of their investments.… Continue reading Top Crypto Scandals: FTX Crypto Scam and Other Notable Hacks in 2022
In today’s digital age, personal information is worth more than gold, and cybercriminals are always on the lookout for new ways to obtain it. The dark web serves as a thriving and clandestine marketplace where cybercriminals exploit various methods, such as phishing scams and malware attacks, to acquire breached credentials containing usernames and passwords. Subsequently,… Continue reading Prices for Breached Data on the Dark Web in 2022
DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a security protocol that protects brands from email-based impersonation, phishing, and other malicious attacks. The protocol helps to ensure that only emails from authorized sources reach their intended recipients and helps to identify and block malicious emails that attempt to impersonate the brand. As with any security… Continue reading 4 Key Limitations of DMARC For Brand Protection
Billing itself as a fast and modern cloud-based messaging app, Telegram is a major competitor to Signal and WhatsApp, with more than 700 million active users. Privacy represents Telegram’s biggest draw. Users have the option of protecting their chats with end-to-end encryption and even setting messages to self-destruct. Unfortunately, these privacy features add a layer… Continue reading Telegram App Scams & The Steps To Protect Against Them
Cybercriminals run rampant during the holiday season. For them, it’s the busiest and most profitable time of the year. Your security team may be out on PTO, employees may be distracted by year-end activities, and customers are more active online looking for holiday deals. These factors add up to the perfect storm for cybercrime. Follow… Continue reading 24 Security Lessons to Remember This Holiday Season
Business Email Compromise scams are a surging problem that grew in damages from $1.2 billion in 2018 to $1.8 billion in 2020. Also known as a ‘man-in-the-email’ attack, a BEC scam is intended to defraud companies, their customers, partners, and employees by duping them into sending money or sensitive information to fake accounts, sites, or… Continue reading Best Strategies For Stopping Business Email Compromise (BEC) Scams
Cybercriminals today have moved on from obsolete hacking techniques. Techniques that are no longer effective against the sophisticated cybersecurity nets deployed by the world’s biggest corporations. Instead, they’ve found a new element to compromise – the end-user. Using sophisticated social engineering and phishing tactics, cyber attackers gain access to sensitive data by compromising end users’… Continue reading How to Identify & Eliminate Credential Harvesting Threats
How to Detect and Stop Social Media Fraud in 2023 In the online world, social media fraud happens fast. We know this to be true at Bolster through the threat intelligence our systems gather and the customers we serve. In 2020, we detected over 6.9 million phishing and scam pages, resulting in over $320 billion… Continue reading Social Media Fraud – How to Detect & Fraud on Social Media in 2023
Introduction Artificial intelligence and machine learning continue to show promising results for a wide-range of cybersecurity applications. At Bolster, we depend heavily on the latest advancements to achieve ultra-fast, ultra-accurate phishing and scam verdicts at scale. One of the most important tasks that is performed with our technology is logo detection to assist in detecting… Continue reading Logo Detection – Your Secret Weapon for Online Brand Protection
In the previous blog we introduced the elements of an effective Domain Risk Management (DRM) practice. The practice comprises 1.) active management; 2.) proactively acquiring domains to mitigate threats; and 3.) the continual monitoring of domains. Diving deeper into the DRM process, this blog will outline the ongoing need to discover and assess domain threats.… Continue reading Domain Risk Management – Discovering the threats