Why SlashID
Identity ProtectionBlogNewsroomDocumentation
Why SlashID
Use Cases
Discover Identity RiskEliminate IAM DebtIdentity Threat Detection & ResponseIdentity Security Posture ManagementAutomate Compliance Gap AnalysisSecure Non-Human Identities & AI AgentsStop Phishing AttemptsStop Impersonation & Deepfake AttacksDiscover & Block Shadow AppsIdentity ProtectionBlogNewsroomDocumentation

Blog

Security

/ 16 Mar, 2026

Deepfake Impersonation Attacks (Part 1): Anatomy of Modern Deepfakes

In 2024, Arup, a global engineering consultancy, fell victim to one of the most sophisticated deepfake fraud attacks, losing $25 million after an employee joined what appeared to be a legitimate video conference with AI-generated deepfake executives.

This post explores the technical evolution of deepfake technology, from early GANs to modern diffusion models, and explains how attackers can now bypass enterprise liveness detection to impersonate executives in real-time video calls.

Deepfake Impersonation Attacks (Part 1): Anatomy of Modern Deepfakes

Security

/ 16 Mar, 2026

Deepfake Impersonation Attacks (Part 1): Anatomy of Modern Deepfakes

In 2024, Arup, a global engineering consultancy, fell victim to one of the most sophisticated deepfake fraud attacks, losing $25 million after an employee joined what appeared to be a legitimate video conference with AI-generated deepfake executives.

This post explores the technical evolution of deepfake technology, from early GANs to modern diffusion models, and explains how attackers can now bypass enterprise liveness detection to impersonate executives in real-time video calls.

Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team

Security

/ 16 Sep, 2024

Non-Human Identities Security: Breaking down the problem

Compromised non-human identities are increasingly being leveraged by attackers to gain initial access and as a vector for lateral movement.

Microsoft, Cloudflare, and Dropbox are just a few of the companies that have fallen victim to this growing threat this year.

In this blog post, we focus on the attack vectors involved and on what actions companies must take to prevent these attacks.

Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team

New Feature

/ 26 Aug, 2024

Detecting Man-in-the-Middle Attacks with SlashID

Detect when attackers access your website through malicious proxies with SlashID.

Ivan Kovic, Vincenzo Iozzo
Ivan Kovic, Vincenzo Iozzo
Ivan Kovic, Vincenzo Iozzo

Deep Dives

/ 22 Aug, 2024

A deep dive in the AWS credential leaks reported by Palo Alto Networks

Thousands of credentials were exfiltrated from exposed .env files in the latest large-scale attack uncovered by Palo Alto.

Protecting cloud services and non-human identities spread across many vendors and environments is now table-stakes: SlashID can help.

Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team

New Feature

/ 22 Jul, 2024

SlashID RBAC: Globally-available role-based access control

SlashID RBAC is a globally replicated role-based access control system that allows you to restrict access to resources based on permissions assigned to specific persons.

In this post, we will show you how to use RBAC in SlashID, and how to create permissions, and roles, and assign them to persons.

Robert Laszczak, Vincenzo Iozzo
Robert Laszczak, Vincenzo Iozzo
Robert Laszczak, Vincenzo Iozzo

Security

/ 15 Jul, 2024

Protecting against Snowflake breaches

In the last few weeks several very high-profile breaches have been in the news, from Santander to Ticketmaster and AT&T.

These breaches all have the same attack vector: identity-based attacks against Snowflake instances.

In this article, we discuss the causes of the breach and our approach to protect against identity-based attacks against Snowflake.

Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team

New Feature

/ 24 Jun, 2024

Introducing the SlashID Local Deployment

The SlashID local deployment is our answer for developers looking to build, run and test apps locally.

Local development with SlashID can be a good fit for your evaluation, prototyping, development, and continuous integration workflows.

SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo

Security

/ 17 Jun, 2024

ODPR: A Framework for Securing Non-Human Identities

Identity-based attacks have become the primary way attackers move laterally in a network. They are also responsible for half of the initial intrusions.

Addressing these attacks requires very different tooling and approaches compared to malware-based attacks.

In this article we delve into the SlashID framework to address these attacks.

Ben Reinheimer, Vincenzo Iozzo
Ben Reinheimer, Vincenzo Iozzo
Ben Reinheimer, Vincenzo Iozzo

New Feature

/ 10 Jun, 2024

Credential Tokenization: Protecting third-party API credentials

Stolen secrets and credentials are one of the most common ways for attackers to move laterally and maintain persistence in cloud environments.

In this blog post we introduce credential tokenization to protect secrets at runtime, introduce separation of duties, and reduce the credential rotation burden.

Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team

New Feature

/ 3 Jun, 2024

Secure API and M2M Access with OAuth2 Client Credentials and SlashID's sidecar

The recent Hugging Face breach is yet another reminder that securing machine-to-machine communication and API access is essential today.

By leveraging OAuth2 Client Credentials, you can enhance security, enable fine-grained access control, simplify credential management, and benefit from a standards-based approach.

Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
1 2 3 4 5 6 7

Ready to start a top-tier security upgrade?

Get in touch
Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Why SlashID
Identity Protection Use Cases
Identity Management

Resources

Blog Newsroom Documentation

We use cookies to improve your experience. Read our cookie policy.