AI, identity, FraudGPT identity, risk, CrowdStrike digital identitiies Identity Theft Financial Fraud Digital Age

CrowdStrike Adds Honeytokens to Deceive Cybercriminals

CrowdStrike has extended the capabilities of its Falcon Identity Protection to make it simpler to employ honeytokens to identify compromised credentials that could be used to launch a cyberattack and the tools ...
Security Boulevard
cybersecurity SaaS extension

LayerX Platform Secures Browsers Using Machine Learning

LayerX this week emerged from stealth to launch a modern browser extension that leverages machine learning algorithms to ensure connections made to applications are secure. LayerX CEO Or Eshed said an approach ...
Security Boulevard
domain browser SaaS credentials, attack, cybercriminals INKY web credentials Shodan EV certificates

INKY Finds New Phishing Attack Technique Spoofing Netflix

A report published this week by INKY Technology, a provider of an email security platform, suggested cybercriminals have found yet another way to impersonate the web pages of a popular brand to ...
Security Boulevard
Microsoft security

Disneyland Instagram, Facebook Accounts Defaced

Late last week, Disneyland found itself the victim of a self-styled “super hacker.” The attacker took over and defaced Facebook and Instagram accounts belonging to the ‘happiest place on earth.’” One thing’s ...
Security Boulevard
cyberinsurance fraud Digital transformation

Fraud Shifts to Travel, Gaming Sites as Economies Reopen

The prevalence of digital fraud attempts on businesses and consumers continues to rise as malicious actors are shifting their focus in 2021 from financial services to travel and leisure and other industries ...
Security Boulevard

Why Insider Threat Denial is Everyone’s Problem

People don’t like to admit when they’re wrong. And really, who can blame them? Being wrong is uncomfortable, anxiety-inducing, and embarrassing. These are all feelings that people try their best to avoid ...

Red Flag Alert: Service Accounts Performing Interactive Logins

In the world of account security, we often focus on end user accounts as the weak vector vulnerable to attackers. On the contrary, we at Preempt see something that happens just as ...

Empowering Employees to Reduce Security Incidents

In the hustle and bustle of our modern world, we can all get easily lost in the noise. One kind of noise is most frustrating for security teams: the noise of security ...

Disrupting an Attacker from Exploiting Domain Credentials

Security professionals often feel they don’t have enough time to keep up with modern threats. In fact, Crowdstrike researchers have found that top threat actors can go in and out of networks ...