top of page

Gold Comet Blog
Search


Deepfake Impersonation Fraud: When Seeing (and Hearing) Is No Longer Believing
Deepfake impersonation fraud uses AI-generated audio and video to impersonate trusted individuals and manipulate victims into authorizing payments, sharing sensitive data, or spreading misinformation. Think of the damage that can be done, the misinformation that can fly unchecked when a deepfake that looks authentic goes viral.

Gold Comet
Mar 113 min read


27 New Cybercrime Statistics for 2025: What the Numbers Mean (and What to Expect in 2026)
In this post are 27 data-backed statistics from 2024–2025 that summarize where cybercrime is concentrated today and what organizations must know to prepare for next year.

Gold Comet
Dec 3, 20257 min read


Top 10 Cybercrimes
While we’ve defined many lesser-known cybercrimes in Gold Comet's newsletter series, Cybercrime Defined, these ten still persist as the most frequently used strategies … because they still work! AI has opened a whole new land of opportunity for cybercriminals to discover novel and creative ways to steal your data!

Gold Comet
Jun 11, 20253 min read


Cybersecurity Incident Response in the DIB: Lessons for Enterprises
An effective incident response plan is essential for business operations, a vital component of modern enterprise incident management. The ability to detect, assess, and recover from a cyber breach quickly can make the difference between a minor disruption and a catastrophe.

Gold Comet
Apr 24, 20255 min read


15 Harmful Ways Info-Stealers Can Exploit Corporate Credentials
The average consumer loves new technology and doesn't worry about info-stealers, but here are 15 ways they can exploit your valuable data.

Gold Comet
Sep 18, 20243 min read


Why Consumers Should Care About Secure Data Storage - Post #100!
Cybercriminals are ramping up their attacks on personal and business secure data storage - you should care and implement mitigations NOW.

Gold Comet
Jul 25, 20244 min read


Understanding Whitelisting: A Cybersecurity Best Practice
This post explores the concept of whitelisting and its significance in enhancing security with privileged access management (PAM).

Gold Comet
Jun 19, 20242 min read


In the News: Info-Stealers Obtain 400K Stolen Corporate Credentials
In the News: 400K corporate credentials stolen by infostealers and15 ways cybercriminals use stolen credentials to harm your enterprise.

Gold Comet
Aug 2, 20233 min read


Gold Comet Wins New Patent Award – Protecting Information Exchange and Leakage
Gold Comet's new patent award protects information exchange and mitigates information leakage.

Gold Comet
Feb 22, 20233 min read


Business Email Compromise (BEC): Why Email Security is So Important
Business Email Compromise (BEC) is growing rapidly as cybercriminals become more sophisticated in their security breach strategies.

Gold Comet
Jan 4, 20232 min read


Email Hacker Threats Today: HYPERSCRAPE Malware
Hyperscrape, an email-scraping tool, allows attackers to steal emails from inboxes without leaving much evidence of the attack.

Gold Comet
Sep 14, 20222 min read


How Secure is Your Messaging?
A secure messaging platform is essential for collaborating on proprietary projects, protecting the transfer and storage of sensitive data.

Gold Comet
Oct 28, 20203 min read


Business Email Compromise (BEC) Attacks
Post on BEC, which tricks company employees using email into making sensitive business information accessible to cybercriminals.

Gold Comet
Oct 23, 20202 min read
bottom of page
