
ForensicScope Regula 4125 detects counterfeit documents
Regula has launched the portable and autonomous ForensicScope Regula 4125. The new device enables ID verification in any place and environment: at border and inland …

Deepfakes force a new era in fraud detection, identity verification
The rise in identity fraud over the past two years has significantly impacted all industries, especially finance, banking, fintech, and crypto, according to Regula. With …

Regula updates Document Reader SDK with full support for Digital Travel Credentials
Regula has updated its Regula Document Reader SDK. Now, the software fully supports the new Digital Travel Credential (DTC) format, aligned with the International Civil …

Deepfakes question our ability to discern reality
As deepfakes become increasingly sophisticated and accessible, their potential for misuse in areas such as cybercrime, misinformation campaigns, and identity theft continues …

Crypto companies are losing ground to deepfake attacks
The crypto sector stands out as the only surveyed industry where deepfake fraud surpasses traditional document fraud in prevalence, according to Regula. Crypto companies …

Discover how online fraud can impact your business
Recent reports underscore increased fraud losses driven by both old methods and new technologies. As fraudsters exploit advancements in AI and other sophisticated tools, their …

Rising identity security risks: Why organizations must act now
As the priority for managing digital identities intensifies, organizations are encountering severe identity security risks. Recent findings indicate that many businesses are …

Infosec products of the month: July 2024
Here’s a look at the most interesting products from the past month, featuring releases from: AttackIQ, AuditBoard, Black Kite, BlueVoyant, Druva, GitGuardian, Invicti …

New infosec products of the week: July 5, 2024
Here’s a look at the most interesting products from the past week, featuring releases from LogRhythm, NordVPN, Regula, and Scythe. LogRhythm’s enhancements boost analyst …

Regula Forensic Studio updates improve the accuracy of forensic examinations
Regula has released a significant update to its operating software, Regula Forensic Studio. This major revamp enhances the functionality of forensic devices, improves …

The biggest downsides of digital ID adoption
As innovative digital verification methods continue to emerge, the debate around their reliability and effectiveness is heating up, according to Regula. Companies employ …

Digital ID adoption: Implementation and security concerns
As digital transformation accelerates, understanding how businesses are preparing for and implementing digital ID technologies is crucial for staying ahead in security and …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility