Bolster is excited to share a major landmark in our path to making the internet a safer place…

The Bolster Blog
Thought provoking blogs discussing recent trends on digital risk protection services, phishing protection, threat intelligence, artificial intelligence, machine learning, brand protection and more!
Recent Posts
Introducing CheckPhish for Microsoft Copilot: Smarter Phishing Detection Inside Your Security Workflow
Today’s security teams face a rising tide of phishing and malware threats—and often, the biggest challenge isn’t just identifying the risk. It’s the time-consuming process.
Introducing Email Scanning in CheckPhish: Real-Time Protection for Suspicious Messages
We’re excited to announce a major new capability in CheckPhish: you can now upload suspicious emails for real-time analysis and threat detection. With our new.

Buyer’s Guide: Purchasing a Brand Security Solution
Your brand is constantly under attack. To stay protected, you need an AI-powered brand security solution that keeps up with today’s AI-driven threats. Not sure what to look for? Use the Bolster AI Buyer’s Guide to evaluate your options.
Quishing: The Rising Threat & Dangers of QR Code Phishing
QR codes have transitioned from a symbol of convenience to…
Scamming the Scammers: Phishing Kit Creator is Stealing the Telegram Token from Scammers
At Bolster Research Labs, we recently observed that phishing kit…
Ad-ventures: Investigating the Misuse of Google Ads in Malvertising Campaigns
In the sprawling extent of the internet, Google Ads has…
Beyond Phishing: The Rising Threat of Stealer Logs Compromising Security
The arms race between cyber defenders and attackers is becoming…
Dissecting the Phishing Kit behind the Axis Bank Reward Points Campaign
Phishing campaigns targeting banking and financial institutions have always been…
Dissecting the Newest Phishing Kit Targeting the Qatar Post
Name brand postal services have been increasingly targeted by phishing…
The Dark Underbelly of the Internet: Bulletproof Hosting and Phishing Epidemic
What is Bullet Proof Hosting [BPH]? Within the digital community,…
Analyzing Advanced Multi-Lingual Tech Support Phishing Kits Hosted on SaaS Providers
The Tech Support Scam consistently remains in the spotlight due…
Vast USPS Delivery Phishing Campaign Sees Threat Actors Abusing Freemium Dynamic DNS and SaaS Providers
You may be familiar with the common phishing tactics like…
How Massive Phishing Campaigns Abuse Decentralized Web Hosting To Scam Victims
Decentralized web hosting offers a unique method that moves…
Web Beacons: How To Effectively Use Them For Phishing Detection
Phishing attacks are the most common attack vector for…