spoofing

Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust
Stephen Kowski | | CTO Corner, DocuSign, Email Protection, Fraud, government attack, impersonation, social engineering, spoofing
The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed ...
The Financial Impact of Online Brand Impersonation
The genuine threat of online brand impersonation is that it can damage a company’s customer relationships and tarnish its reputation in the market. Studies show that when a customer becomes the target ...

What is Brand Impersonation?
Brand impersonation (or brand spoofing) is a form of phishing and social engineering in which the fraudster poses as a legitimate brand. A brand impersonation attack leverages consumer trust in the brand ...

Threat Actors Use Obscure or Self-Made Link Shortener Services for Credential Harvesting
Threat Actors Use Obscure or Self-Made Link Shortener Services for Credential Harvesting Earlier this month our expert takedown team responded to a bad actor that used link shortener services to obfuscate a ...

FTC: Half of Fraud Involves Impersonation
Mitch Warren | | brand protection, cybercrime, Cybersecurity, Phishing, scam, social media, spoofing
According to data released by the FTC in its annual Consumer Sentinel Network Data Book, nearly half of the fraud reported to the federal government in 2023 fell into the category of ...

What is Mobile App Fraud?
alluresecurity | | brand protection, Cybersecurity, fake mobile app, fake mobile apps, Mobile, Mobile App, mobile app fraud, mobile apps, spoofing
Mobile app fraud is a type of fraud involving the use of mobile applications on a smartphone, tablet, or similar device. Within that, there are many methods and strategies that fraudsters employ ...

Phishing Kits Targeting Regional Banks and Credit Unions
Explore why traditional brand protection fails against recent phishing kits discovered by Allure Security that use bot detection & what you need to do about it. The post Phishing Kits Targeting Regional ...

Mastering X and Twitter Takedowns: How to Handle Brand Impersonations
Mitch Warren | | advertisement, brand impersonation, brand protection, Cybersecurity, delete, fake, Impersonation Takedown, page, post, profile, remove, social media, spoofing, takedown, Twitter, Twitter Impersonation, website takedown, X
Table of Contents Distinguishing brand impersonations in the world of X/Twitter can sometimes be perplexing. Unlike LinkedIn, which enforces more stringent measures against misrepresentation, X tends to take a more flexible stance ...

Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
Tom Eston | | account hacking, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, google, hacked, Hacking, Information Security, Infosec, Instagram, Malware, Meeting Invite, Meta, Microsoft Teams, online, Podcast, Podcasts, Privacy, rat, RATs, remote-access Trojan, security, social media, Spoofed Online Meetings, spoofing, Teams, technology, Weekly Edition, Zoom
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...

iOS sideloading & alternative app stores: Preparing for increased brand risk this March
In March 2024 (less than 30 days), Apple’s iOS 17.4 will for the first time ever allow iOS sideloading or the download of iOS apps from alternative app stores other than the ...