Well-funded hackers, many from North Korea, submit hundreds of resumes and pose as candidates to infiltrate your intellectual property.
They use fake identities, deepfake interviews over Zoom, VPNs, and virtual machines to bypass traditional screening.
One successful attack exposes code and customer data. At the very least it wastes your recruiter time and budget in the process.
| Feature | Applicant Check Device ID | Traditional Screening |
|---|---|---|
| Covers every browser & OS (96 % accuracy) | ✓ | Relies on IP / email only |
| Detects VMs, VPNs, and headless browsers | ✓ | Usually ignored |
| Privacy-friendly (non-sensitive signals) | ✓ | Often stores PII or cookies |
| Real-time API / webhook for ATS | ✓ | Manual log review |
"cside helped our insider risk program prevent infiltration before it happened. Helping security and recruiting teams focus on what really matters."
FAQ
Frequently Asked Questions
At various level bypass methods are being used. To prevent you from seeing where the user is applying from VPN services are used. To apply for many applications fast they generate answers to questions in forms using LLMs. When going through identity verifications fake ID cards are being used sometimes using stolen identities. During interviews life answering bots help them respond to questions. There have even been videos circulating on the web where the bad actor used deep fake technology to cover their face.
The device fingerprinting looks for signals indicating that the application is made from automated or remote environments. Essentially separating real human devices from automated environments.
Cside simply detects signals that indicate VPN use as well as using virtual machines. There are a number of methods we use. None of the methods we use compromise a users privacy, they purely relate to system hardware identifiers.
Valuable intellectual property, access to user data, source code and API access keys to sensitive environments like payment platforms mean that bad actors have the highest chance of finding high value substance to exploit your business. Independent of the role, they will try to get their hands on the highest value items to resell or extort your business.