Tag: Impersonation
-
Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions
Memcyco will showcase its solutions at Deloitte’s annual Cyber iCON event, demonstrating how organizations can build effective defenses …
-
Disney+ Cyber Scheme Exposes New Impersonation Attack Tactics
Brand impersonation in cyber-attacks has reached new levels of sophistication, a recent research article by Abnormal Security has …
-
US Man Jailed 8 Years for SIM Swapping and Apple Support Impersonation
Golshan’s schemes involved SIM swapping, social media account takeovers, Zelle payment fraud, and impersonating Apple Support personnel. …
-
Key Takeaways from the 2023 Domain Impersonation Report
One of the most pervasive and unavoidable threats on the internet, domain impersonation can be used by bad actors as the basis for a wide …
-
Supply Chain Attackers Escalate With GitHub Dependabot Impersonation
In the latest attack to target software supply chains, attackers managed to slip in malicious code updates to hundreds of GitHub …
-
How the Okta Cross-Tenant Impersonation Attacks Succeeded
A series of highly sophisticated attacks have sparked significant concerns among organizations that rely on multifactor authentication …
-
ZenRAT Malware Uncovered in Bitwarden Impersonation
Discovered by Proofpoint, ZenRAT is a modular remote access trojan (RAT) specifically targeting Windows users with a primary focus on …
-
X (Twitter) to Collect Biometric Data from Premium Users to Combat Impersonation
X, the social media site formerly known as Twitter, has updated its privacy policy to collect users’ biometric data to tackle fraud and …
-
Brand Impersonation Scams in Middle East & Africa See Massive Growth
The number of detected fake and scam websites pertaining to be reputable brands from the Middle East and Africa increased by 135% last …
-
Brand Impersonation Online is a Multidimensional Cybersecurity Threat
Brand impersonation happens much more often than people realize. In CSC’s latest Domain Security Report, we found that 75% of domains for …
-
BEC Groups Target Firms With Multilingual Impersonation Attacks
Two business email compromise (BEC) groups have been observed using executive impersonation to conduct attacks on companies worldwide. The …
-
What CISOs Can Do About Brand Impersonation Scam Sites
Apply these 9 tips to proactively fight fraudulent websites that steal customers’ trust, money, and personally identifiable …
●●●