Bolster AI Blog: Cybersecurity, AI Technologies, and More
Company updates and technology articles
Decentralized web hosting offers a unique method that moves away from the typical dependence on centralized servers for website and content hosting. It avoids the conventional system of confining data and files to a sole server or a few clustered servers. Instead, decentralized web hosting disseminates these pieces of information across a broad network… Continue reading How Massive Phishing Campaigns Abuse Decentralized Web Hosting To Scam Victims
Decentralized web hosting offers a unique method that moves away from the typical dependence on centralized servers for website and content hosting. It avoids the conventional system of confining data and files to a sole server or a few clustered servers. Instead, decentralized web hosting disseminates these pieces of information across a broad network… Continue reading How Massive Phishing Campaigns Abuse Decentralized Web Hosting To Scam Victims
Copyright infringement is a fairly common technique for cyber criminals looking to profit off unsuspecting businesses and consumers. Individuals and businesses indulge in it for various reasons, ranging from pure ignorance to wilful infringement based on malicious intent. There are several famous copyright infringement examples. Perhaps the most famous is that of Napster, a peer-to-peer… Continue reading Copyright Infringement Examples: Lessons to Help You Protect Your Business
In today’s age of extensive digital transformation and expanded online presence, organizations must have robust solutions to protect their digital assets. Two prominent players in this space are Bolster and ZeroFox. We’ve put together a Bolster vs Zerofox comparison of these two digital risk protection solutions across various aspects: domain monitoring, social media monitoring, automated… Continue reading Bolster vs Zerofox: Comparing Brand Protection Solutions
When researchers from Armorblox discovered a phishing attack from bad actors impersonating the well-known security company Proofpoint, it set off alarm bells for a lot of organizations and security teams that weren’t actively safeguarding against phishing attacks. These criminals targeted a global communications company with over 1,000 employees with a phishing email containing a link… Continue reading Real-world Phishing Attack Highlights Why Every CISO Needs to Protect Against Brand Impersonation
The case of Napster and the music industry is widely quoted in discussions about copyright infringement. In the late 90s, Shawn Fanning and Sean Parker co-founded Napster, a file-sharing application that allowed users to download and share music for free. The innovation quickly caught the attention of the music industry, who saw it as a… Continue reading Copyright Infringement: 3 Steps to Defending Your Business
As an IT security and risk management professional, understanding copyright infringement is crucial to protecting your business. You might think copyright infringement is centered around things like musicians using each other’s songs without permission, or recording a movie at a movie theater, but copyright infringement is actually a larger issue that impacts businesses of all… Continue reading Copyright Infringement: What It Is and How to Protect Your Business
Prime Day is Amazon’s largest, most highly anticipated retail event, often thought as bigger than Cyber Monday and Black Friday combined. Shoppers enjoy two days of special sales, this year running from July 11th-12th, on everything from Amazon devices such as the Echo and Kindle to stylish furniture. While shoppers flock to Amazon’s website to… Continue reading How to Avoid Online Shopping Scams on Amazon Prime Day
Malicious website domains are a headache for organizations to deal with, mainly because they are easy for hackers to put up, but difficult for security and risk teams to successfully takedown. Conducting a website takedown requires time and resources, not just to contact the right people (whether it’s lawyers, domain registrars, or regulatory groups), but… Continue reading How to Conduct a Website Takedown In 3 Easy Steps
The dangerous impact of typosquat domains, and how frequently bad actors are mimicking legitimate brands is not an unknown problem for security leaders. It’s critical for security and IT teams to properly scan and monitor for brand threats that live across the internet, using machine learning technology to identify domains with similarities to the known… Continue reading Embedded Secrets in Webpage DOMs (and How to Use this Data to Protect Your Assets)
Bolster’s threat research team recently uncovered a widespread brand impersonation scam campaign targeting 100+ popular clothing, footwear, and apparel brands. Among the notable brands affected by this campaign are Nike, Puma, Adidas, Casio, Crocs, Sketchers, Caterpillar, New Balance, Fila, Vans, and numerous others. This campaign came live around June 2022 and had peak phishing activity… Continue reading Widespread Brand Impersonation Scam Campaign Targeting Hundreds of the Most Popular Apparel Brands