Why SlashID
Identity ProtectionBlogNewsroomDocumentation
Why SlashID
Use Cases
Discover Identity RiskEliminate IAM DebtIdentity Threat Detection & ResponseIdentity Security Posture ManagementAutomate Compliance Gap AnalysisSecure Non-Human Identities & AI AgentsStop Phishing AttemptsStop Impersonation & Deepfake AttacksDiscover & Block Shadow AppsIdentity ProtectionBlogNewsroomDocumentation

Blog

Security

/ 16 Mar, 2026

Deepfake Impersonation Attacks (Part 1): Anatomy of Modern Deepfakes

In 2024, Arup, a global engineering consultancy, fell victim to one of the most sophisticated deepfake fraud attacks, losing $25 million after an employee joined what appeared to be a legitimate video conference with AI-generated deepfake executives.

This post explores the technical evolution of deepfake technology, from early GANs to modern diffusion models, and explains how attackers can now bypass enterprise liveness detection to impersonate executives in real-time video calls.

Deepfake Impersonation Attacks (Part 1): Anatomy of Modern Deepfakes

Security

/ 16 Mar, 2026

Deepfake Impersonation Attacks (Part 1): Anatomy of Modern Deepfakes

In 2024, Arup, a global engineering consultancy, fell victim to one of the most sophisticated deepfake fraud attacks, losing $25 million after an employee joined what appeared to be a legitimate video conference with AI-generated deepfake executives.

This post explores the technical evolution of deepfake technology, from early GANs to modern diffusion models, and explains how attackers can now bypass enterprise liveness detection to impersonate executives in real-time video calls.

Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team

Deep Dives

/ 20 Oct, 2022

App-layer cryptographic primitives for secure storage of user data

In this blogpost we explore the cryptographic primitives and design decisions we made building our Data Vault module.

Our service is a globally replicated, field-level encrypted, data store to keep user data safe and compliant with Data Protection laws while improving UX by decreasing latency through data locality.

Giovanni Gola, Vincenzo Iozzo
Giovanni Gola, Vincenzo Iozzo
Giovanni Gola, Vincenzo Iozzo

Deep Dives

/ 23 Sep, 2022

The good, the bad and the ugly of Apple Passkeys

The widely anticipated Apple passkeys launch happened just a few weeks ago with the iOS 16 release.

Passkeys are a cross-device extension of FIDO credentials compatible with WebAuthn. They address the main UX issue of WebAuthn, cross-device credentials.

In this article we’ll explore the Apple passkeys implementation, how passkeys compare to traditional FIDO credentials and why the decision of Apple to get rid of device attestation and resident keys is a significant step back for security.

Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team

Compliance

/ 14 Sep, 2022

The Security and Regulatory Compliance Benefits of WebAuthn

The WebAuthn standard helps you stop phishing and account takeover (ATO) attacks while maintaining HIPAA and SCA compliance.

WebAuthn is significantly safer than passwords, due to the way the keys are stored and because it prevents credential stuffing and reuse attacks.

Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team

Security

/ 12 Sep, 2022

Phishing Attacks – WebAuthn to the rescue

Authentication token theft is on the rise, with the latest Uber breach demonstrating yet again the threat that it poses.

WebAuthn significantly reduces user experience friction and hence allows for more frequent authentication prompts, offsetting the need for long-lived tokens and significantly curbing the risk of phishing.

Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
1 2 3 4 5 6 7

Ready to start a top-tier security upgrade?

Get in touch
Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Why SlashID
Identity Protection Use Cases
Identity Management

Resources

Blog Newsroom Documentation

We use cookies to improve your experience. Read our cookie policy.