Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Prevent Account Takeovers from SEO Poisoning and Fake Search Ads

SEO poisoning has become a major driver of phishing‑driven credential theft. Attackers manipulate search engine results and paid ads so users click on what appears to be a legitimate brand link, only to land on a fake website built to steal login credentials. Attackers combine domain abuse, cloaking, and keyword hijacking to move malicious pages to the top of search results.

Lookalike Domain Attacks Explained

Your potential customers could be interacting with a malicious website that resembles your company's website. This dangerous cyber risk, known as a lookalike domain, is on the rise, with 80% of registered web domains in 2024 resembling 2000 global brands. This article explains what lookalike domains are, their impact on your brand, and why these attacks are increasing, providing real-time strategies to protect your business from domain spoofing.

To protect Canada's financial system, new anti-fraud measures must evolve faster than their foes

The Government of Canada’s launch of an Anti-Fraud Strategy and Financial Crimes Agency acknowledges a reality that banks, fintechs and payment processors already know: the scale, sophistication and speed of digital fraud are outpacing traditional defences. These are vital national commitments, to be sure, but they also underscore the need for companies, institutions and governments to evolve faster than the attacks they face. Fraud has become one of the defining challenges of our time.

Avast Scam Guardian for Mobile: Advanced AI Scam Protection

Introducing Avast Scam Guardian and Scam Guardian Pro for mobile devices—bringing powerful AI-driven scam protection to your smartphone and tablet. Experience complete peace of mind with advanced AI tools that proactively block scam calls before they ring, detect even the most convincing phishing emails and texts, and offer instant expert guidance whenever something seems suspicious—giving you round-the-clock protection against evolving scams. Avast Scam Guardian is now available with Avast Mobile Security in France and Germany, with worldwide availability coming soon.

Detecting the undetectable: Building a fraud detection framework with Elastic

Learn how public sector organizations are using Elastic to identify fraudulent activity with rules and anomaly detection jobs fine-tuned for their specific use cases. Every organization faces the challenge of identifying and combating fraud. In the financial services industry, it might be credit card fraud; in the auto insurance space, staged accident fraud; and in the public sector, unemployment, health insurance, or tax fraud.

Adopting cold-war tactics for AI deep fakes?

The AI arms race in deepfake detection has a critical problem: the technology can't keep up. In this episode, Navroop Mitter, CEO of ArmorText, discusses why the industry is shifting away from relying on AI detection alone. A recent study from SKKU in South Korea found that zero out of sixteen top deepfake detection technologies could reliably identify deepfakes in real-world conditions. They worked fine in controlled lab settings, but failed when it mattered most.

The Top 10 Holiday Text Scams to Leave on "Read" This Season

The holidays bring joy, celebration, and a flood of scam texts designed to steal your money, data, and peace of mind. Every holiday season brings excitement, and unfortunately, a surge in SMS scams targeting unsuspecting consumers. These scam messages might be tiny, but their impact can be huge, ranging from financial loss to identity theft. According to the U.S. Federal Trade Commission, people reported $470 million in losses from text-based scams in 2024, a fivefold increase since 2020.

Why Website Cloning Attacks Evade Brand Protection (and How to Stop Them)

Website cloning attacks are a form of digital impersonation where threat actors replicate a company’s legitimate website to deceive users, harvest credentials, or redirect payments, often before enterprises even realize a clone exists. These attacks exploit brand trust at scale, turning familiarity into a weapon against customers.

LastPass Phishing Campaign Informs Users of Phony Death Notifications

A phishing campaign is targeting LastPass users with phony notifications informing users that someone has notified the company of the user’s death and is trying to gain access to their account. The emails have the subject line, “Legacy Request Opened (URGENT IF YOU ARE NOT DECEASED).” LastPass describes the following attack flow: Notably, the attackers are also calling recipients of the emails and posing as LastPass representatives, adding another layer of legitimacy to the campaign.