Allure Security Product Update: January 2024 Edition
It’s a new year, and the Allure Security online brand protection-as-a-service application has a new look and new features, setting a new standard in brand protection.…
LEARN MOREArticles about website spoofing, cybersecurity trends, and how to protect your customers from hackers.
It’s a new year, and the Allure Security online brand protection-as-a-service application has a new look and new features, setting a new standard in brand protection.…
LEARN MOREOnline brand impersonation attacks threaten businesses large and small, but do brands really need to open their wallets to protect themselves? The answer might be more…
LEARN MOREFraudulent search engine advertising does not stop with Google. Brands should also consider Bing ads as an attack vector for malvertising.
LEARN MOREThere’s no denying the importance of online sales to retail and other consumer-facing brands. Forecasts predict worldwide e-commerce sales will grow 56% in the coming years…
LEARN MOREScammers are having a hard time getting into consumers’ inboxes these days. Consequently, they are adapting and diversifying their methods – employing innovative technology alongside retro…
LEARN MORERecently, a number of brands have approached our threat response team about fake social media accounts impersonating executives at their companies. Scammers impersonating an executive on…
LEARN MOREAs a credit union member, I find myself thwarting inbound scam attempts far more often than I used to. Between fake phone calls with deceiving caller…
LEARN MOREWe recently highlighted the rise of spoof profiles on LinkedIn, explained the damage they can do to your reputation and employer brand, and provided tips about…
LEARN MORELast year set a new record for fake profiles removed from the LinkedIn platform. This shows that fraudsters are dedicating more time and effort to scams…
LEARN MOREThe FBI warns that fraudsters have begun mimicking legitimate mobile apps, injecting them with malicious code, and then distributing them through mobile beta-testing app services. Attackers’…
LEARN MOREThe Internet’s latest online forum – Instagram Threads – has come into the spotlight and garnered over 150 million users within the first 2 weeks. Considering…
LEARN MOREGetting a Facebook post, profile, or page taken down because it impersonates your brand and could lead to the defrauding of your customers can seem like…
LEARN MOREKnowing exactly what to do when your brand is impersonated online seems like a daunting task. A number of nuances may send you down the wrong…
LEARN MOREThe FBI said that in 2022, phishing took the top spot as the most reported cybercrime by a wide margin. While scammers using deceptive e-mails and…
LEARN MOREAs part of its mission to protect against criminal threats “…which are increasingly emanating from our digitally connected world,” the FBI’s Internet Complaint Center (IC3) collects…
LEARN MOREOur Vice President of Operations Molly DeQuattro recently shared threat research with leading cybersecurity news site Dark Reading to bring awareness to how scam websites targeting…
LEARN MOREWith an exponential increase in third party app store user downloads on the horizon, heeding Apple’s sideloading warnings are more important than ever. The National Telecommunications…
LEARN MOREAllure Security has observed an uptick in scammers using dynamic DNS (DDNS) services to claim subdomains on which they publish scam websites masquerading as known brands.…
LEARN MOREWith the creation and mass adoption of ChatGPT, AI – inspired topics have been thrust to the forefront of everyday conversation. GPT (Generative Pre-training Transformer) is…
LEARN MOREMany brands end up confused about how best to address parked domains with names similar to their own. Some customers have come to us with a…
LEARN MOREAllure Security has observed an increase in scammers targeting credit union brands and their members by compromising vulnerable websites and adding pages impersonating credit unions to…
LEARN MOREA recent scam made use of two different fake Facebook profiles to try and trick me into divulging my identity data and a picture of my…
LEARN MOREGartner has identified Allure Security as one of 26 ‘Example DRPS Providers’ in its recently published “Emerging Tech: Adoption Growth Insights in Digital Risk Protection Services.”…
LEARN MOREThe NCUA’s proposed cyber incident reporting rule raises some questions about what exactly a reportable incident might be and how federally insured credit unions can prepare for the rule.
LEARN MOREThis month industry veteran Erik Dasque joined Allure Security as CTO and dove right in executing on his vision of fostering a good engineering culture, reducing…
LEARN MOREOne of the largest global digital payments platforms in the world used decoy user data and credentials to deceive fraudsters and trick them into exposing themselves.…
LEARN MORETL;DR – We quantified the pervasiveness of online brand impersonation attacks against regional banks, community banks, and credit unions during the first quarter of 2022 –…
LEARN MORELike the rest of the financial services industry, regional banks and credit unions face increased cyber attacks on their institutions and customers. The Federal Deposit Insurance…
LEARN MOREThe White House’s 2021 American Rescue Plan may also lay out plans for fraudsters’ 2022 online payment scams. The new law doesn’t introduce new taxes, but…
LEARN MOREThis is a guest blog post from CHEQ, the leader in Go-to-Market Security. Retail go-to-market teams know the importance of meeting their customers at the right…
LEARN MOREThe number of brand impersonation attacks using unique scam websites hit an all-time high in December 2021 – more than tripling compared to early 2020. That’s…
LEARN MORESome brand protection services make fancy claims about their web takedowns, sometimes calling them “virtual” or “automated.” When you learn of a fraudulent website impersonating your…
LEARN MOREI’m grateful today. Actually, I’m grateful most days because I get to work with an amazing team to combat a pressing problem that costs the world…
LEARN MOREThe pandemic has considerably sped up the adaption of technology through roughly every sector, and it’s shown – with more companies than ever utilizing the Internet…
LEARN MORENo doubt you have read the news reporting on a shocking number of smash and grab thefts. Where brazen organized “flash mobs” descend upon a retailer…
LEARN MOREThanksgiving is right around the corner this year, and the festivities are (Hopefully) looking to return to relative normalcy. But how can Thanksgiving conversations be “normal”…
LEARN MOREPublished by Safety Detectives (Link to original article) Safety Detectives: Please share your company background, how you got started, and your mission. Allure Security Technology: Allure Security…
LEARN MOREIn the past year – and within the past 6 months especially, cryptocurrencies are witnessing a boom the likes of which have never been seen before.…
LEARN MORENow that we seemingly approach a post-pandemic period, the travel industry has seen huge increases in demand. Naturally, scammers and shady travel sites are not far…
LEARN MOREAllure Security surveyed IT and security personnel to understand how companies are addressing digital impersonation and account takeover threats. The survey finds that companies are being…
LEARN MOREWe’ve all heard about the Dark Web. That corner of the Internet not routinely indexed by search engines and generally unreachable without specific links or configuration…
LEARN MORETeachers – where would we be without them? We all know at least one educator who has changed our lives significantly for the better. Whether it…
LEARN MORESpring has officially sprung, and with the amount of time we’ve all spent online this past year, our routine spring cleaning should certainly take a more…
LEARN MOREPeople often watch out for malicious, fraudulent links in emails and text messages, and many receive training to spot telltale signs of an obvious phishing attempt.…
LEARN MOREAnd they aren’t just using emails to get it either From voicemail deep fakes to malicious drones to point of sale systems becoming credit card repositories,…
LEARN MORENot that long ago, investing your hard-earned cash meant balancing between stocks and bonds. Retirement funds were managed by large organizations and made all the decisions…
LEARN MOREA perfect Internet fraud storm is upon us. What is a cybercriminal to do? The answer: Almost anything they want. No matter what government agency or…
LEARN MOREIt’s that time of year for new year’s resolutions and those of us in Cybersecurity focus on the ways cybercriminals will attack and who they will…
LEARN MORECome on it’s 2020, so some of us have more time on our hands and we are stuck in front of our computers longer than normal. …
LEARN MOREBy Salvatore Stolfo Even though election day has passed, we still have to wait for a final answer. So while we wait; now is the time…
LEARN MOREAs we approach the mid-way point of National Cyber Security Awareness Month (NCSAM), a topic that continues to be discussed over and over again are phishing…
LEARN MOREWe love catching the bad guys before they succeed and that is just what we did on Saturday morning. Security is all about speed and stopping…
LEARN MOREBy Salvatore Stolfo About a week ago, our team at Allure Security was investigating a phishing site targeting one of our banking customers. We had detected…
LEARN MOREYour Internet persona, or digital identity, is of great value and constantly sought after by hackers, scammers and fraudsters. Believe it or not, your risk begins…
LEARN MOREData breaches and identity theft caused by orchestrated phishing attacks have long been a notorious problem for the banking and financial services sector. But today, virtually…
LEARN MOREA couple weeks ago a visitor to our website asked to chat with our sales team about a problem they were having. They clicked on the…
LEARN MORESince the dawn of phishing way back in the 90s, one of the tactics phishers have used to deceive their victims is a domain name that…
LEARN MOREThank you doctors, nurses, grocers, delivery drivers, pharmacists, and first responders! Thank you to those of you working in a NOC or a SOC keeping the…
LEARN MOREAttackers prey on customers I’ve written before about how adversaries exploit the trust customers have in well-known brands. Attackers specifically build spoof sites targeting well-known companies…
LEARN MORE