Memcyco

Ramat Gan, Israel
2021
  |  By Arthur Zavalkovsky
It’s no secret that phishing has always relied on deception. Scam-targeted enterprises the world over warn their customers of the social engineering tactics and brand impersonation designed to trick them into handing over credentials. Besides email-based phishing, social media has become a hotbed for phishing attacks, with scammers using fake ads, impersonated accounts, and fraudulent messages to lure users.
  |  By Ran Arad
As the adage goes, time is money, and nowhere does this ring more true than in an evolving threat landscape. The faster companies detect, respond, and recover from data breaches, the better for their pockets. Using AI and security automation to shorten the breach lifecycle has been shown to save $2.2 million more on average compared to not employing these technologies.
  |  By Charlie Madere
Today, fraud schemes don’t follow predictable patterns. Enterprises are up against AI-generated deepfake attacks, multi-stage social engineering, and impersonation scams that exploit gaps in traditional fraud prevention strategies. And they know it. According to PwC, 59% of enterprises completed a fraud risk assessment in the 12 months prior to June 2024, showing they take fraud protection seriously. But beyond knowing your risks, there’s a need for better ways to tackle and mitigate them.
  |  By Julian Agudelo
The bad news – if you’re wondering about the DORA compliance date, it already passed on January 17th 2025. The good news? If you’ve been too busy to even think about the EU’s Digital Operational Resilience Act, it’s not too late to score some quick compliance wins. This DORA compliance checklist is your blueprint for establishing not just compliance, but checks and balances for maintaining it.
  |  By Julian Agudelo
If you’re just discovering the DORA and haven’t yet launched your compliance incentives, start with Memcyco’s DORA compliance guide that’s better suited for those just starting the journey. If you’ve already launched your DORA compliance incentives, this DORA readiness assesment will provide detailed benchmarks to ensure you’re on the right track.
  |  By Sheena Kretzmer
Hackers don’t always need malware or harvested credentials to break into systems and accounts. Why bother with technical hacks when bad actors can trick people into getting what they want? From deepfake video calls impersonating friends or relatives to perfectly cloned login portals that steal credentials in real-time, social engineering scams are more convincing than ever. In fact, social engineering now accounts for 70 to 90% of cyber attacks.
  |  By Eran Tsur
In 2024’s State of Digital Impersonation Resilience report there was one key finding that neatly frames the digital impersonation fraud challenge. Of the businesses surveyed, 72% use a digital impersonation protection solution, but only 6% could confirm its efficacy. In other words, scam-targeted industries are investing in finding solutions, but those solutions aren’t delivering.
  |  By Kate Cox
Phishing attacks are a huge threat. They prey on human trust and manage to trick even the most tech-savvy users. A successful attack on a company’s customers can weaken it financially, create compliance issues, and cause long-lasting reputational damage. Scammers have stolen over $1 trillion globally in just the past year – a staggering figure that rivals the GDP of some nations.
  |  By Julian Agudelo
As scam-prone enterprises know, innovations in digital technologies raise the specter of phishing-related brand impersonation scams as much as they help mitigate it. Take rogue Generative AI tools like Fraud GPT and ‘Phishing-as-a-Service’ as just two examples of how fraudsters are co-opting new technologies as part of customer account takeover (ATO) schemes.
  |  By Julian Agudelo
In industries like banking, e-commerce, and logistics, where millions of transactions occur daily, fraud often begins with a single malicious device. Attackers use proxies and VPNs to mimic legitimate users, but subtle clues — browser settings, session habits, or time zone mismatches – can expose their schemes. Device fingerprinting solutions have become essential for businesses aiming to enhance fraud prevention and improve user experience.
  |  By Memcyco
With thanks to @dataprotectiongumbo for featuring our Kate Cox on their latest podcast episode. Let's unpack 2025's Top Tips for Avoiding Scams.
  |  By Memcyco
Marc Schein is chattin’ with Memcyco's Gideon Hazam in ChattinCyber's latest episode. The conversation provides valuable insights into the challenges posed by spoofing and phishing attacks, the connection between the two, and the need for robust authentication measures to protect against these threats. The discussion highlights the importance of detecting attacks quickly, identifying at-risk users, and implementing effective protection measures to safeguard organizations and their customers.
  |  By Memcyco
A huge thanks to Dave from DIY Cyber Guy for hosting our co-founders, Israel and Ori Mazin, on an episode discussing airline fraud.
  |  By Memcyco
Understanding the Digital Impersonation Pandemic Across Sectors: Retail, Finance, Charity, Higher Education, Media, etc. Join Ido Mazin of Memcyco and Shira Rubinoff in this conversation, which will shed light on the prevalence and impact of digital impersonation fraud across key industries and explore strategic defenses to safeguard against this growing threat.
  |  By Memcyco
Ever had those sleepless nights, tossing and turning, worrying about your next health checkup? Well, in the cyber world, it’s your brand that’s losing sleep! We recently talked to 200 top-notch security and fraud professionals—think of them as the cardiologists of the cybersecurity world. They spilled the beans on how digital impersonation attacks mess with their brand’s health.
  |  By Memcyco
Shira Rubinoff and David Habusha discuss the crucial topic of Single Sign-On (SSO) in the modern cybersecurity ecosystem, addressing misconceptions, convenience and also its security risks.
  |  By Memcyco
What are digital impersonation scams, and what damage do they cause? Watch this video with Shira Rubinoff and Memcyco's Zach Lakovics to unpack this important topic.
  |  By Memcyco
Discover cutting-edge strategies to combat the surge in account takeover fraud with insights from industry leaders in our latest webinar collaboration with Techstrong.
  |  By Memcyco
Watch Israel Mazin and Shira Rubinoff break down merging threats in online fraud, offering prevention and real-time detection strategies.
  |  By Memcyco
In this exclusive video interview, Israel unpacks the latest threats that businesses face in the digital age and shares his expert insights with Shira on fortifying defenses against the ever-changing tactics of cyber adversaries.
  |  By Memcyco
In today's competitive online marketplace, optimizing your website for maximum conversions is more important than ever. That's why we've created this comprehensive guide to help you identify the 10 surprising reasons that explain lower conversion rates. From website design to customer trust, we'll explore the factors that can impact your conversion rates and provide actionable tips to help you improve them.
  |  By Memcyco
As more businesses and individuals establish their online presence, the risk of brand impersonation attacks increases exponentially. These attacks can harm a brand's reputation, compromise end-user assets and even lead to financial losses.

What if stopping phishing-related digital impersonation scams were *easier* than falling for them?

Memcyco is a next-generation digital risk protection solution powered by, not only AI, but real-time 'nano defenders'.

Memcyco already protects millions of user accounts, saving global businesses millions in incident remediation costs.

Visit Memcyco.com for a quick demo, or a free fake-site audit.

Now your Risk, Security and Fraud teams can do all of this, while barely lifting a finger:

  • SHUT DOWN DIGITAL IMPERSONATION ATTACKS that result in ATO fraud, PII theft and ransomware *before* phishing or 'smishing' messages have even been sent to customers.
  • INSTANTLY KNOW when bad actors are researching your website code, to impersonate your site.
  • GET ON-THE-SPOT VISIBILITY of exactly which customers clicked a fake link, who visited which fake sites, and which customers had their credentials harvested.
  • TURN ATTACKS ON ATTACKERS, using bad actors' own credentials theft-attempts against them, automatically locking them out of your website and customer accounts when they try to use stolen credentials.
  • SLASH COSTS & MTTD: with instant fake-site scam detecton and response, for massive incident handling cost savings and workload reduction of up to 85%

Only Memcyco keeps you covered and customers protected during the 'window of exposure', from the moment a fake site or page goes live, and for as long as stolen credentials are available to be used against you.

The bottom line: if it's not real-time, it's not real digital risk protection.