Attending RSA 2023?
April 24-27th?
Meet us
there
!
Forrester TEI Study:
Bolster Delivered 278% ROI.
Learn More
Contact Us
Support
Log In
Platform
Domain Monitoring and Takedowns
Use Bolster AI to Detect and Take Down Look-Alike and Fake Sites
Social Media Monitoring and Takedowns
Stop Fakes and Fraud from Eroding Your Business and Brand
App Store Monitoring and Takedowns
Rapid Detection and Takedown of App Store Infringements
Dark Web Monitoring
Get Actionable Insights into Dark Web Threats
24/7 Support
Round-the-Clock Support When You Need It the Most
Solutions
Account Takeover Protection
Early Detection of Phishing Campaigns and Compromised Accounts
Phishing & Scam Protection
Protect Against Phishing and Scam Attacks That Bypass Traditional Defenses
Brand Protection
Automatically Detect and Take Down Brand Abuse Sites
Typosquatting Protection
Automatically Detect and Take Down Impersonating Domains
Why Bolster?
Industry-leading AI Technology
Industry-leading Takedown Technology
The Bolster Difference
Customers
Company
COMPANY
Overview
Careers
Our Team
Press
Contact Us
Resources
RESOURCES
Resource Center
Blog
Checkphish
Domain Risk Report
Global Fraud Index
Glossary
Request Demo
Blog
Support
Log In
Request Demo
Home
Resources
Blog
Author (Felicia Zhang)
Felicia Zhang
phishing
Phishing Trends: 2019-2022: The Evolving Threat Landscape
Bolster's 2022 report predicted the growth of cyberfraud in a digital-first society. Q3 2022 saw a new record high of 1.27M phishing attacks. Stay tuned for Bolster's 2023 report for more insights on evolving trends.
By:
Felicia Zhang
2 MONTHS AGO
2 MIN
cyber-education
24 Security Lessons to Remember This Holiday Season
Daily cybersecurity tips to fight against holiday scams this season. Think of it as an advent calendar, curated for security professionals!
By:
Felicia Zhang
3 MONTHS AGO
8 MIN
social media protection
How Modern Security Teams Can Leverage Social Media Threat Monitoring
In the past few years, the use case for social media monitoring has evolved, becoming increasingly vital for security professionals to track potential threats online.
By:
Felicia Zhang
4 MONTHS AGO
6 MIN
phishing
|
ato
How to Identify & Eliminate Credential Harvesting Threats
Cybercriminals today have moved on from obsolete hacking techniques to more sophisticated attack methods, like credential harvesting. Understanding how credential harvesting works and how it can be contained is the first step in getting the upper hand.
By:
Felicia Zhang
10 MONTHS AGO
5 MIN
What’s Brand Protection Got to Do with External Attack Surface Management?
External attack surface management includes a variety of public-facing assets, but at least one has not previously been under security’s jurisdiction. Are you missing this key area of your external attack surface?
By:
Felicia Zhang
11 MONTHS AGO
3 MIN
Previous
Read More