by Gene Reich | Sep 22, 2025 | Deception As A Service, Identity Verification, Secure Communication, Social Engineering
From Phishing Kits to Full-Service Fraud Two decades ago, the most a criminal could hope to sell online was a basic phishing kit. These were crude templates, often copied from bank websites, that allowed even unsophisticated actors to send convincing looking emails....
by Gene Reich | Sep 19, 2025 | Ephemeral Messaging, Secure Communication, Social Engineering, Traceless Cybersecurity
In every modern organization, information flows constantly. Password resets, access requests, API keys, and sensitive files all move between people and systems as part of everyday work. Most of the time, these exchanges happen without a second thought. A technician...
by Gene Reich | Sep 15, 2025 | Cybersecurity Trends, Ephemeral Messaging, Reader's Choice, Social Engineering, Traceless Cybersecurity
How Compliance Frameworks Took Center Stage Modern cybersecurity is framed not only around technology but also regulation. Beginning in the 1990s, governments and industries began codifying the rules of data protection. HIPAA was introduced in 1996, setting out...
by Gene Reich | Sep 2, 2025 | Cybersecurity Threats, Cybersecurity Trends, Pretexting, Secure Communication, Social Engineering
The rising cost of verification Every organization now runs a quiet economy of verification. Before a password is reset, a vendor changes banking details, or a finance approval is granted, someone must decide if the person on the other end is who they claim to be....
by Gene Reich | Aug 28, 2025 | Cybersecurity Trends, Pretexting, Scattered Spider, Social Engineering
Since 2023, the threat group Scattered Spider has repeatedly persuaded help-desk staff across multiple organizations to reset credentials over the phone without verifying identity, bypassing multi-factor authentication (MFA) in several high-profile breaches. This was...