DocuSign impersonation attacks are exploiting government-vendor theft

Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust

The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed ...

The Financial Impact of Online Brand Impersonation

The genuine threat of online brand impersonation is that it can damage a company’s customer relationships and tarnish its reputation in the market. Studies show that when a customer becomes the target ...
What is Brand Impersonation?

What is Brand Impersonation?

Brand impersonation (or brand spoofing) is a form of phishing and social engineering in which the fraudster poses as a legitimate brand. A brand impersonation attack leverages consumer trust in the brand ...
Threat Actors Use Obscure or Self-Made Link Shortener Services for Credential Harvesting

Threat Actors Use Obscure or Self-Made Link Shortener Services for Credential Harvesting

Threat Actors Use Obscure or Self-Made Link Shortener Services for Credential Harvesting Earlier this month our expert takedown team responded to a bad actor that used link shortener services to obfuscate a ...
FTC: Half of Fraud Involves Impersonation

FTC: Half of Fraud Involves Impersonation

According to data released by the FTC in its annual Consumer Sentinel Network Data Book, nearly half of the fraud reported to the federal government in 2023 fell into the category of ...
What is Mobile App Fraud?

What is Mobile App Fraud?

Mobile app fraud is a type of fraud involving the use of mobile applications on a smartphone, tablet, or similar device. Within that, there are many methods and strategies that fraudsters employ ...
Illustration depicting a phishing kit mass producing phishing websites

Phishing Kits Targeting Regional Banks and Credit Unions

Explore why traditional brand protection fails against recent phishing kits discovered by Allure Security that use bot detection & what you need to do about it. The post Phishing Kits Targeting Regional ...
Mastering X and Twitter Takedowns: How to Handle Brand Impersonations

Mastering X and Twitter Takedowns: How to Handle Brand Impersonations

Table of Contents Distinguishing brand impersonations in the world of X/Twitter can sometimes be perplexing. Unlike LinkedIn, which enforces more stringent measures against misrepresentation, X tends to take a more flexible stance ...
iOS sideloading & alternative app stores: Preparing for increased brand risk this March

iOS sideloading & alternative app stores: Preparing for increased brand risk this March

In March 2024 (less than 30 days), Apple’s iOS 17.4 will for the first time ever allow iOS sideloading or the download of iOS apps from alternative app stores other than the ...