Bolster is excited to share a major landmark in our path to making the internet a safer place…

The Bolster Blog
Thought provoking blogs discussing recent trends on digital risk protection services, phishing protection, threat intelligence, artificial intelligence, machine learning, brand protection and more!
Recent Posts
How SoFi Protects Its Brand from Phishing and Fraud
In today’s digital-first financial world, trust is everything—and it’s constantly under attack. That’s why SoFi, one of the world’s top mobile banks, is investing in.
Conditional Phishing and Beyond: The Hidden Triggers in Modern Cyber Attacks
Introduction Phishing has always been about deception, but in recent years, it has become far more selective and evasive. One increasingly common technique is conditional.

Buyer’s Guide: Purchasing a Brand Security Solution
Your brand is constantly under attack. To stay protected, you need an AI-powered brand security solution that keeps up with today’s AI-driven threats. Not sure what to look for? Use the Bolster AI Buyer’s Guide to evaluate your options.
Beyond Hashing: The Future of Anti-Phishing is Image Similarity Search
Computer vision modules are a critical component in a cybersecurity…
BERT for Image Transformers (BEiT) : A Definitive Guide to Computer Vision Breakthrough
Convolutional Neural Networks (CNNs) have dominated the computer vision landscape…
Vast USPS Delivery Phishing Campaign Sees Threat Actors Abusing Freemium Dynamic DNS and SaaS Providers
You may be familiar with the common phishing tactics like…
ICC World Cup 2023: Unmasking the Scams and Threats Targeting Fans Worldwide
The ICC World Cup 2023, the 13th edition of…
Under the Radar: Phishing Websites Masquerading as UPI Gateways to Secretly Steal Customer Data
Many threat actors are moving away from utilizing brand…
Automating Multi-Touch Takedowns with Large Language Models at Scale
As part of our Large Language Models at work…
Empowering Brand Protection: Large Language Models and Their Role in Webpage Intent Identification for Brand Safety
Pattern recognition is a key skill that has enabled…
Evaluating Web Scraping, Crawling, and Automation with NodeJS Libraries
This blog is part 1 of a web scraping…
How Decentralized Web Hosting is Used in Phishing Campaigns
Decentralized web hosting moves away from reliance on centralized…
How to Conduct a Website Takedown In 3 Easy Steps
Malicious website domains are a headache for organizations to…
Embedded Secrets in Webpage DOMs (and How to Use this Data to Protect Your Assets)
The dangerous impact of typosquat domains, and how frequently…
Widespread Brand Impersonation Scam Campaign Targeting Hundreds of the Most Popular Apparel Brands
Bolster’s threat research team recently uncovered a widespread brand…