It takes a lot to surprise engineers working on AI, and have them call something magical. ChatGPT stands tall as one of those inventions. OpenAI unlocked a new world of truly, cognitive, interactive and most importantly general purpose AI with ChatGPT. Suddenly. it was possible for machines to not only understand human language but also… Continue reading Using LLM’s for Heightened Cybersecurity: Supercharging Automated Takedowns With GPT
In late 2022, American Express was at the center of a brand impersonation attack. The attackers impersonated this well-known financial services brand to attempt to steal confidential information from victims at a nonprofit organization. The brand impersonation attack started with an email message that looked like it came from American Express. It included a malicious… Continue reading Brand Impersonation Attacks: Which Industries are Most at Risk?
As part of our Large Language Models at work blog series, we now delve into how we integrated the generative AI capabilities of LLMs to automate our critical takedown processes. But as we’ve seen with other technological advances, as the popularity of apps have grown, so have the cybersecurity threats related to them, and the… Continue reading Automating Multi-Touch Takedowns with Large Language Models at Scale
There’s no doubt social media cyber risk attacks are on the rise. While more and more brands rely on social media to gain trust and recognition from their intended buyers, scammers are continuing to innovate new social media scams, including executive impersonation scams, to gain sensitive data and financial information from unsuspecting consumers. The growing… Continue reading 5 Ways to Protect Your Business Against Executive Impersonation Scams
Cybercriminals keep coming up with new methods to deceive and defraud businesses. One such method gaining in popularity are executive impersonation attacks, also known as “CEO fraud,” where criminals use hacking techniques to impersonate business executives and gain access to sensitive information and money. According to the FBI’s Internet Crime Report 2022, a common type… Continue reading What Are Executive Impersonation Attacks, and What Do They Look Like?
The term external attack surface management (EASM) is gaining traction amongst security vendors and analyst firms alike. External attack surface management encompasses a wide variety of public-facing assets, many of which security teams are aware of and have protected for years. However, there are other attack vectors that have not previously been under the security… Continue reading What’s Brand Protection Got to Do with External Attack Surface Management?
Businesses are relying more and more on digital assets and solutions to run operations. As the focus shifts to highlight the digital age, brand protection has become an essential aspect of business strategy. Criminals are attacking brands online with fake domains, counterfeit products, and scams, all to gain access to company data and finances. As… Continue reading Definitive Guide to Modern Brand Protection
The metaverse promises a new level of immersion and connection for users. Applications and platforms that use virtual reality, augmented reality, and mixed reality technologies provide new ways for users to explore and interact with the world around them. However, with this new level of engagement comes a new set of risks for brands. The… Continue reading Phishing in the Metaverse: The New Reality of Brand Protection
Copyright infringement is a fairly common technique for cyber criminals looking to profit off unsuspecting businesses and consumers. Individuals and businesses indulge in it for various reasons, ranging from pure ignorance to wilful infringement based on malicious intent. There are several famous copyright infringement examples. Perhaps the most famous is that of Napster, a peer-to-peer… Continue reading Copyright Infringement Examples: Lessons to Help You Protect Your Business
In today’s age of extensive digital transformation and expanded online presence, organizations must have robust solutions to protect their digital assets. Two prominent players in this space are Bolster and ZeroFox. We’ve put together a Bolster vs Zerofox comparison of these two digital risk protection solutions across various aspects: domain monitoring, social media monitoring, automated… Continue reading Bolster vs Zerofox: Comparing Brand Protection Solutions