How Threat Actors Exploit Generative AI For Social Engineering and Credential Compromise

Social engineering attacks are one of the most commonly used methods for cyber criminals to gain access to sensitive data and information. Recent advances in generative AI have enabled threat actors to utilize AI-generated content to fuel these attacks, making... Read More

How to Proactively Protect Your Organization’s High-Value Targets

Cybercriminals are always looking for ways to exploit the exposed personal data of high-value targets to breach companies. High-value targets (HVTs) are those individuals within an organization who have access to sensitive information or assets and have the potential to... Read More

Human Element Remains Key Factor in Cybersecurity: The 2023 Verizon DBIR Report and VanishID’s Global Threat Intelligence Findings

The spotlight in the fight against cybercrime continues to be an often overlooked yet pivotal factor – the human element. A profound understanding of this dimension is vital for safeguarding digital ecosystems, and the recently published 2023 Verizon Data Breach... Read More

VanishID joins the Tidal Product Registry™

We all know that the cybersecurity vendor landscape is extensive and looks complex. Although there is a gap in cybersecurity talent worldwide, there’s certainly no lack of products in the marketplace that provide defenders with threat visibility and security controls.... Read More

Keeping criminals from exploiting personally identifiable information

As specialists in human attack surface protection, we at VanishID know all too well the importance of preventing the exploitation of exposed personally identifiable information (PII) by cyber criminals. While we handle this problem for enterprises, individuals need resources to... Read More

Threat-Informed Defense for Human Attack Surface: Mapping Threat Intelligence to Target Intelligence

The exploitation of human attack surface data and a crucial intelligence gap According to Verizon’s 2022 DBIR report, stolen passwords and phishing were the top two techniques used by threat actors last year, accounting for around 70% of all analyzed breaches.... Read More

The rising threat of credential compromise and how companies can safeguard against this attack vector

Compromised employee credentials are a major threat to any organization’s cyber security. According to Verizon’s 2022 Data Breach Investigation Report, compromised credentials were the single largest source of breaches, accounting for nearly half of them. By taking the right proactive... Read More

Copyright © 2019 – 2025 Picnic Corporation (dba VanishID)