Syndicated Blog

Blog – Bolster AI
My WordPress Blog
Account takeover fraud: 5 steps for protecting your customers

Account takeover fraud: 5 steps for protecting your customers

According to research by the Aite Group, financial institutions are facing a 64% uptick in account takeover attacks than before the pandemic. This number is expected to rise further as the digital ...
Phishing in the Metaverse: The New Reality of Brand Protection

Phishing in the Metaverse: The New Reality of Brand Protection

The metaverse promises a new level of immersion and connection for users. Applications and platforms that use virtual reality, augmented reality, and mixed reality technologies provide new ways for users to explore ...
How Massive Phishing Campaigns Abuse Decentralized Web Hosting To Scam Victims

How Massive Phishing Campaigns Abuse Decentralized Web Hosting To Scam Victims

| | Blog, Phishing
Decentralized web hosting offers a unique method that moves away from the typical dependence on centralized servers for website and content hosting. It avoids the conventional system of confining data and files ...

Copyright Infringement Examples: Lessons to Help You Protect Your Business

Copyright infringement is a fairly common technique for cyber criminals looking to profit off unsuspecting businesses and consumers. Individuals and businesses indulge in it for various reasons, ranging from pure ignorance to ...

Bolster vs Zerofox: Comparing Brand Protection Solutions

| | Blog, bolster
In today’s age of extensive digital transformation and expanded online presence, organizations must have robust solutions to protect their digital assets. Two prominent players in this space are Bolster and ZeroFox. We’ve ...
Real-world Phishing Attack Highlights Why Every CISO Needs to Protect Against Brand Impersonation

Real-world Phishing Attack Highlights Why Every CISO Needs to Protect Against Brand Impersonation

When researchers from Armorblox discovered a phishing attack from bad actors impersonating the well-known security company Proofpoint, it set off alarm bells for a lot of organizations and security teams that weren’t ...

Copyright Infringement: 3 Steps to Defending Your Business

The case of Napster and the music industry is widely quoted in discussions about copyright infringement. In the late 90s, Shawn Fanning and Sean Parker co-founded Napster, a file-sharing application that allowed ...

Copyright Infringement: What It Is and How to Protect Your Business

| | Blog
As an IT security and risk management professional, understanding copyright infringement is crucial to protecting your business. You might think copyright infringement is centered around things like musicians using each other’s songs ...
How to Avoid Online Shopping Scams on Amazon Prime Day

How to Avoid Online Shopping Scams on Amazon Prime Day

| | Blog, Typosquatting
Prime Day is Amazon’s largest, most highly anticipated retail event, often thought as bigger than Cyber Monday and Black Friday combined. Shoppers enjoy two days of special sales, this year running from ...
How to Conduct a Website Takedown In 3 Easy Steps

How to Conduct a Website Takedown In 3 Easy Steps

Malicious website domains are a headache for organizations to deal with, mainly because they are easy for hackers to put up, but difficult for security and risk teams to successfully takedown. Conducting ...