Deepfakes and Other Attacks
These identity-based, visual attacks have been known for their use in bullying and exploitation, but they're also being used to infiltrate Fortune 100 companies too.
Learn more
They're haunting colleges everywhere. Come to listen to this AI-generated podcast about it.
Learn more
The resume was great. The references checked out. After four video interviews, they thought they had found the perfect candidate for the job. They didn't realize that they were the job.
Learn moreExplore and read other posts here.
These identity-based, visual attacks have been known for their use in bullying and exploitation, but they're also being used to infiltrate Fortune 100 companies too.
Learn more
Page sources are one of the many tools a hacker loves to use during the reconnaissance stage. Come find out how EASY it is to scrape email addresses off a website to use in an automated password cracking attack.
Learn more