
Casey Joyce
Articles
-
Nov 18, 2024 |
securityboulevard.com | Casey Joyce
n today’s increasingly digital and interconnected world, traditional security measures — once deemed foolproof — are now being exploited by sophisticated cybercriminals. Whether it’s fake account creation, account takeovers (ATO), session hijacking, or fraudulent transactions, the attack surface is larger than ever.
-
Sep 19, 2024 |
arkoselabs.com | Vikas Shetty |Patrick Kehoe |Casey Joyce
A New Threat Vector EmergesConsider this perspective: You're adept at navigating the rapidly evolving threat landscape, because you’re experienced. Your company stands as one of the most targeted enterprises by bad actors globally, and that means you’ve just about seen it all. Accustomed to the pace, variety and unpredictability of digital attacks, you maintain confidence in your robust security stack, strategy and world-class team. But what happens when a novel threat vector emerges?
-
Feb 29, 2024 |
arkoselabs.com | Ken Palla |Vikas Shetty |Casey Joyce
Arkose Labs recently reviewed various 2023 security reports, confirming that phishing attacks are “now the most common form of cybercrime, with an estimated $3.5 billion spam emails sent every day.” Phishing has been with us for decades and consumers and employees fall for it daily.
-
Jan 24, 2024 |
arkoselabs.com | Vikas Shetty |Casey Joyce
The online commercial banking industry is experiencing a rising challenge with the subtle yet impactful presence of reverse proxy attacks, particularly in the form of reverse proxy phishing. As financial institutions continue to embrace digital transformation, the threat landscape has expanded, bringing reverse proxy attacks to the forefront of the commercial banking sector.
-
Sep 19, 2023 |
securityboulevard.com | Casey Joyce
Phishing attacks have long been a major concern in the cybersecurity landscape. These malicious attempts to steal sensitive information often involve creating fake websites that mimic legitimate ones, tricking unsuspecting users into revealing their personal data. Traditional phishing attacks typically rely on cloned websites to deceive victims. However, cybercriminals are constantly evolving their tactics, and one such innovation is the reverse proxy phishing attack.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →