Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Dune Security Is Now Available on AWS Marketplace

Dune Security is now available on AWS Marketplace, allowing enterprises to deploy User Adaptive Risk Management through AWS for faster protection against social engineering and insider threats.

September 4, 2025
3 minute read
Product & Company
This is some text inside of a div block.
This is some text inside of a div block.
Modern glass skyscrapers representing interconnected enterprise infrastructure, highlighting lateral movement risks in cybersecurity and the need for user layer threat detection.Modern glass skyscrapers representing interconnected enterprise infrastructure, highlighting lateral movement risks in cybersecurity and the need for user layer threat detection.

Lateral Movement: How Attackers Expand Access After Initial Compromise

Lateral movement turns a single compromise into an enterprise-wide breach. Learn how attackers spread, why it evades detection, and how CISOs can contain it.

September 3, 2025
8 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.
Dune Security and Reality Defender announce new cybersecurity partnership to stop deepfake attacks and AI-generated media threats targeting employees. Dune Security and Reality Defender announce new cybersecurity partnership to stop deepfake attacks and AI-generated media threats targeting employees.

Dune Security and Reality Defender Partner to Stop AI-Generated Media Threats Targeting Enterprises

Deepfakes and AI-generated attacks are targeting employees faster than legacy tools can keep up. Dune Security and Reality Defender are partnering to deliver layered protection against these threats, combining real-time detection with user layer intelligence.

September 11, 2025
5 minute read
Partnerships
This is some text inside of a div block.
This is some text inside of a div block.
Businessman on mobile phone, illustrating how vishing attacks use voice-based social engineering to impersonate trusted contacts and bypass enterprise security. Businessman on mobile phone, illustrating how vishing attacks use voice-based social engineering to impersonate trusted contacts and bypass enterprise security.

What Is Vishing? How Voice Phishing Works and How to Stop It

Vishing attacks use voice-based social engineering to bypass traditional defenses. Learn how attackers exploit urgency, trust, and AI-generated audio to trigger breaches – and what enterprises must do to stop them.

August 11, 2025
9 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.

Third-Party Access Is the New Insider Threat

Third-party breaches now drive 30% of incidents. Learn how attackers use valid vendor credentials to move undetected, escalate access, and operate like insiders inside your network.

June 27, 2025
8 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.

BEC Has Already Cost $55 Billion and AI Is Making It Worse

Business Email Compromise has already caused over $55 billion in losses. Now AI is scaling these attacks with deepfakes, voice clones, and urgent pretexts. Learn how modern BEC works and what CISOs can do to stop it.

June 16, 2025
8 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.

How Ghost Students Are Exploiting College Enrollment Systems to Steal Federal Aid

Criminal fraud rings are targeting college aid systems with fake student identities. These scams use automation, identity theft, and AI to steal financial aid, lock out real students, and overwhelm public institutions. Here’s how it works and what security leaders in higher ed need to know.

June 13, 2025
7 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.

How Employee Fatigue Drives Human Error in Cybersecurity

Employee fatigue fuels human error and cybersecurity breaches by creating behavioral blind spots attackers exploit through social engineering and cognitive overload. Replace static awareness training with adaptive, real-time protection built for enterprise-scale risk.

June 6, 2025
5 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.

ChatGPT in the Wrong Hands: How AI is Being Used in Cybercrime

Generative AI is reshaping enterprise cybersecurity by targeting trust, behavior, and user access. Learn how AI-powered threats bypass static defenses and what CISOs must do to protect the human layer.

May 27, 2025
5 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.