All Blogs

HUMAN BLOG
Me, You, and the GPU
READ NOW

HUMAN BLOG
New Detection Techniques and How Mouse Movements Can Catch Bots
READ NOW

HUMAN BLOG
The Fraud/Friction Tightrope: Account Takeover
READ NOW

HUMAN BLOG
Exploit Stuffing, Log4Shell, and Automation
READ NOW

HUMAN BLOG
HUMAN Achieves ISO 27001 Certification
READ NOW

HUMAN BLOG
Why Security Leaders Need Advertisers
READ NOW

HUMAN BLOG
The Beginner’s Guide to Phishing
READ NOW

HUMAN BLOG
10 Ways to Secure Your Company’s Accounts
READ NOW

HUMAN BLOG
The impact of social distancing on digital advertising
READ NOW

HUMAN BLOG
Doppelganger’s Delight: How One Person is Exploiting Your WiFi Router
READ NOW

HUMAN BLOG
White Ops Wins Eight 2020 Cybersecurity Excellence Awards
READ NOW

HUMAN BLOG
The Cybercrime Starter Kit: Inside Anti-Detection Browsers and Account Takeovers
READ NOW

HUMAN BLOG
New App Monetization Monkey Business: How Monkey Patching Is Being Used to Bypass Static Checks in Ad SDKs
READ NOW

HUMAN BLOG
What’s the Difference Between Basic and Sophisticated Bots?
READ NOW

HUMAN BLOG
Twoshu, Electric Boogaloo
READ NOW

HUMAN BLOG
White Ops Threat Intel at DEFCON 27
READ NOW

HUMAN BLOG
It’s All Greek to Me
READ NOW

HUMAN BLOG
Hackers for Hire: The Continued Rise of Malware-as-a-Service
READ NOW
- 1