Recent News

02
Feb
Hold Security Releases Major Upgrade to Domain Integrity Service

Hold Integrity’s Domain Integrity Service has released a major upgrade that significantly expands SSL/TLS visibility, enhances reporting, and introduces new automated detection capabilities to identify suspicious certificate activity faster.

30
Jan
The Growing Threat of Imposters Posing as Employees - Read on RSAC Blog featuring our CISO, Alex Holden.

Cybercriminals are increasingly impersonating employees to gain unauthorized entry into organizations. According to a 2025 Gartner survey, one in four candidate profiles worldwide is predicted to be fake by 2028.

Read the latest RSAC blog, featuring insights from Alex Holden, to explore different threat actors and their motives, how these impostors are bypassing the hiring process, and how organizations can spot the red flags.

See more news

Featured Solutions

Threat Intelligence Services

Hold Security indexes and correlates public and private/confidential resources on the Dark Web and Internet to identify malicious and threatening events. Our comprehensive Threat Intelligence Services provide visibility into cyber-criminal activities. We utilize our unique vantage points to derive invaluable intelligence. Hold Security Threat Intelligence Analysts examine threat data and interpret it to eliminate false positives.

Read more

Credential Integrity Service

Stolen user credentials are among the most frequent causes of breaches. Whether it is your company's employee or user credentials that have been stolen, or if a service provider you trusted with their credentials has experienced a breach, cybercriminals may exploit them for their malicious purposes. Hold Security's world-class stolen credentials recovery services will detect your credentials on the Dark Web and promptly notify you before the cyber criminals have a chance to abuse them.

Read more

Domain Integrity Service

Hold Security’s Domain Integrity Service provides monitoring and alerting of domain names. We identify possible abuse, phishing, impersonation, or other misuse as it is relevant to our clients and their brands. With simple and flexible portal access or customized reports created by our analysts, your domain names and brands will be protected using comprehensive and swift identification and alerting of new or existing threats.

Read more

Recent Webinars

War in Iran: Cyber Playbook in Wartime

As the war in Iran escalates, cyber activity follows patterns that are often visible if you know where to look. Based on our research and direct observations, Iranian threat actors have effectively been operating in a war-like state for years. They are not changing how they operate as much as they are adjusting how they use existing access and capabilities with fewer limitations.

 

This session will examine known Iranian APT groups, how their historical tradecraft translates into wartime behavior, and what changes when cyber moves from espionage to active conflict. The focus will remain on observed patterns and practical defensive considerations that organizations can apply immediately.

Alex Holden | March 24, 2026 | 59 min
Watch Webinar

Logo
Solutions Threat Intelligence Services Credential Integrity Service Domain Integrity Service Information Security Assessment Services Incident Response and Investigation
Our offices
Copyright © 2026 Hold Security