White Ops
MENU
CLOSE
Products
Platform
Advertising Integrity
Application Integrity
Marketing Integrity
Solutions
Ad Tech
Marketing
Web Security
Mobile Ad Fraud
CTV Fraud
Resource Center
Blog
Careers
Company
About
Newsroom
Satori Threat Intelligence and Research Team
Contact
Help Center
THE WHITE OPS OFFICES
New York City
Washington DC
London
Victoria
FACEBOOK
LINKEDIN
TWITTER
INSTAGRAM
White Ops Insights and Research
security
All
Ad Fraud
Security
White Ops
Updates
Research & Detection
Marketing Integrity
X
Security
09/24/2020
The Beginner’s Guide to Phishing
READ ARTICLE
Security
05/13/2020
10 Ways to Secure Your Company’s Accounts
READ ARTICLE
Security
04/02/2020
The impact of social distancing on digital advertising
READ ARTICLE
Security
Research & Detection
hero
02/28/2020
Doppelganger's Delight: How One Person is Exploiting Your WiFi Router
READ ARTICLE
Security
Ad Fraud
featured
White Ops
Bot Fraud
02/21/2020
White Ops Wins Eight 2020 Cybersecurity Excellence Awards
READ ARTICLE
Security
Research & Detection
02/11/2020
The Cybercrime Starter Kit: Inside Anti-Detection Browsers and Account Takeovers
READ ARTICLE
Security
Research & Detection
12/11/2019
New App Monetization Monkey Business: How Monkey Patching Is Being Used to Bypass Static Checks in Ad SDKs
READ ARTICLE
Security
11/26/2019
What’s the Difference Between Basic and Sophisticated Bots?
READ ARTICLE
Security
Ad Fraud
Research & Detection
11/25/2019
Twoshu, Electric Boogaloo
READ ARTICLE
Security
08/20/2019
White Ops Threat Intel at DEFCON 27
READ ARTICLE
Security
featured
08/15/2019
It's All Greek to Me
READ ARTICLE
Security
Ad Tech
09/25/2018
Publishers Are the Real Victims of Ad Fraud
READ ARTICLE
Security
Data
Research & Detection
Ad Tech
09/21/2018
Building Resilience to Reverse Engineering: A Study in CAPTCHA
READ ARTICLE
Security
07/31/2018
Hackers for Hire: The Continued Rise of Malware-as-a-Service
READ ARTICLE
Security
07/10/2018
How Pseudonymous Reputation and the Dark Web Have Made Cybercrime Easier Than Ever
READ ARTICLE
Security
05/01/2018
9 of History's Notable Botnet Attacks
READ ARTICLE
Security
04/25/2018
Why Information Integrity Attacks Pose New Security Challenges
READ ARTICLE
VIEW MORE
Newsletter
Subscribe to Email Updates