Traceless Logo Black
  • Solutions
    • Verify
    • Data
    • AI
  • Platform
    • Pricing
    • Integrations
      • Autotask
      • ConnectWise
      • Duo
      • Halo
      • Jira Service
      • Microsoft Authenticator
      • Okta
      • ServiceNow
      • Slack
      • Microsoft Teams
      • Zendesk
  • Industry
    • Banking
    • Enterprise
    • Healthcare
    • Legal
    • MSP
  • Learn

Log in

Traceless Logo Black
  • Book a Demo
  • Pricing
  • Log In
  • Integrations
  • Solutions
    • Verify
    • AI
    • Data
  • Industry
    • Banking
    • Enterprise
    • Healthcare
    • Legal
    • MSP
  • Learn

Sign Up

Book a Demo
Get Started
Charges Laid in Scattered Spider Incident

Charges Laid in Scattered Spider Incident

by Gene Reich | Oct 24, 2025 | Reader's Choice, Scattered Spider

In mid-September, the U.S. Department of Justice and the U.K.’s National Crime Agency jointly unsealed charges against two British teenagers accused of orchestrating one of the most financially damaging cyber extortion campaigns of the past decade. Nineteen-year-old...
The Compliance Paradox: Why Following the Rules Still Leaves You Exposed

The Compliance Paradox: Why Following the Rules Still Leaves You Exposed

by Gene Reich | Sep 15, 2025 | Cybersecurity Trends, Ephemeral Messaging, Reader's Choice, Social Engineering, Traceless Cybersecurity

How Compliance Frameworks Took Center Stage Modern cybersecurity is framed not only around technology but also regulation. Beginning in the 1990s, governments and industries began codifying the rules of data protection. HIPAA was introduced in 1996, setting out...
Jaguar Land Rover Cyber Breach: What We Know So Far

Jaguar Land Rover Cyber Breach: What We Know So Far

by Gene Reich | Sep 10, 2025 | Jaguar Land Rover, Marks & Spencer, marks and spencer, Reader's Choice, Scattered Spider

Jaguar Land Rover (JLR), one of the UK’s largest exporters and a global automotive brand, disclosed on September 2, 2025, that it had suffered a significant cyber incident. The attack forced the company to shut down its IT systems worldwide, halting production at key...
The End of Voice Authentication

The End of Voice Authentication

by Gene Reich | Aug 19, 2025 | AI Fraud Prevention, Cybersecurity Threats, Cybersecurity Trends, Reader's Choice, Social Engineering, Vishing

Transitioning to Identity-Verified Communication Last week, we examined how identity-based fraud is reshaping security priorities across IT, finance, and vendor management. That discussion began with a warning from OpenAI CEO Sam Altman, delivered to regulators and...
What Clorox vs. Cognizant Reveals About MSP Vulnerabilities

What Clorox vs. Cognizant Reveals About MSP Vulnerabilities

by Gene Reich | Jul 24, 2025 | Clorox and Cognizant, Cybersecurity for MSPs, Cybersecurity Threats, Reader's Choice, Scattered Spider

In a lawsuit filed this week in California state court, Clorox alleges that IT provider Cognizant Technology Solutions enabled one of the most damaging cybersecurity breaches in the company’s history, due to a lack of secure processes in routine support interactions...
Cybercrime’s Greatest Hits

Cybercrime’s Greatest Hits

by Gene Reich | Apr 29, 2025 | Cybersecurity for MSPs, Cybersecurity Trends, Reader's Choice

The Hacks That Changed Everything In the early morning hours of February 5, 2016, a message appeared on the network of the Bangladesh Bank in Dhaka. It was a standard, unremarkable instruction—a wire transfer request. Moments later, another. Then another. By the time...
« Older Entries
Traceless Logo 2024 White
  • Follow
  • Follow
  • Follow

Platform
Verify
Data
AI
Pricing
Integrations

Resources
Twitter’s 2020 Breach
Traceless & ConnectWise
What is Traceless?
MSP Vulnerabilities

Company
Book a Demo
Bug Bounty
Terms of Services

SOC 2 Compliant

Privacy Matters
Privacy Policy  Cookie Notice  SMS Terms

© 2026 Traceless. All rights reserved.