Traceless Logo Black
  • Solutions
    • Verify
    • Data
    • AI
  • Platform
    • Pricing
    • Integrations
      • Autotask
      • ConnectWise
      • Duo
      • Halo
      • Jira Service
      • Microsoft Authenticator
      • Okta
      • ServiceNow
      • Slack
      • Microsoft Teams
      • Zendesk
  • Industry
    • Banking
    • Enterprise
    • Healthcare
    • Legal
    • MSP
  • Learn

Log in

Traceless Logo Black
  • Book a Demo
  • Pricing
  • Log In
  • Integrations
  • Solutions
    • Verify
    • AI
    • Data
  • Industry
    • Banking
    • Enterprise
    • Healthcare
    • Legal
    • MSP
  • Learn

Sign Up

Book a Demo
Get Started
Pretexting in the Age of AI:

Pretexting in the Age of AI:

by Gene Reich | Aug 26, 2025 | Cybersecurity Threats, Pretexting, Scattered Spider, Social Engineering

Why Trust-Based Attacks Are Surging In 2023, Clorox reported in court filings that attackers posing as company representatives contacted its IT service provider, Cognizant, and successfully obtained privileged system access. The impostors cited legitimate-sounding...
Inside the Traceless Verification Workflow

Inside the Traceless Verification Workflow

by Gene Reich | Aug 20, 2025 | AI Fraud Prevention, Cybersecurity Threats, Cybersecurity Trends, Scattered Spider, Social Engineering

Replacing Voice with Proven Identity The recent rise in impersonation-based fraud has brought renewed scrutiny to how identity is verified during routine digital interactions. As discussed in our earlier analysis of Sam Altman’s July 2025 warning, artificial...
The End of Voice Authentication

The End of Voice Authentication

by Gene Reich | Aug 19, 2025 | AI Fraud Prevention, Cybersecurity Threats, Cybersecurity Trends, Reader's Choice, Social Engineering, Vishing

Transitioning to Identity-Verified Communication Last week, we examined how identity-based fraud is reshaping security priorities across IT, finance, and vendor management. That discussion began with a warning from OpenAI CEO Sam Altman, delivered to regulators and...
What Clorox vs. Cognizant Reveals About MSP Vulnerabilities

What Clorox vs. Cognizant Reveals About MSP Vulnerabilities

by Gene Reich | Jul 24, 2025 | Clorox and Cognizant, Cybersecurity for MSPs, Cybersecurity Threats, Reader's Choice, Scattered Spider

In a lawsuit filed this week in California state court, Clorox alleges that IT provider Cognizant Technology Solutions enabled one of the most damaging cybersecurity breaches in the company’s history, due to a lack of secure processes in routine support interactions...
Securing the Conversation Layer

Securing the Conversation Layer

by Gene Reich | Jul 15, 2025 | Cybersecurity Threats, Cybersecurity Trends, Ephemeral Messaging, Secure Communication

The Next Frontier in Cyber Defense Cybersecurity, for much of its history, has focused on systems. It has invested in firewalls, intrusion detection, endpoint protection, and increasingly sophisticated authentication methods. But as threat actors evolve, so too do...
Beyond Scattered Spider

Beyond Scattered Spider

by Gene Reich | Jul 8, 2025 | Cybersecurity Threats, Data Exfiltration, Ephemeral Messaging, Scattered Spider, Vishing

Emerging Threat Groups Targeting North American Enterprises The name Scattered Spider has become shorthand for a particular brand of chaos: high-profile ransomware, deep social engineering, and sprawling supply chain infiltration (if you haven’t read our report...
« Older Entries
Next Entries »
Traceless Logo 2024 White
  • Follow
  • Follow
  • Follow

Platform
Verify
Data
AI
Pricing
Integrations

Resources
Twitter’s 2020 Breach
Traceless & ConnectWise
What is Traceless?
MSP Vulnerabilities

Company
Book a Demo
Bug Bounty
Terms of Services

SOC 2 Compliant

Privacy Matters
Privacy Policy  Cookie Notice  SMS Terms

© 2026 Traceless. All rights reserved.