Phishing Protection

Discover attackers impersonating your domains, social accounts, and mobile applications.

  • Phishing Protection

    Phishing Protection

    Discover attackers impersonating your domains, social accounts, people, and mobile applications.

    Read Report
  • ×

    Interactive Threat Hunting on the Dark Web Webinar

    - Nov 6th -

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 November - Interactive Dark Web
    Thank you!
    Error - something went wrong!
  • Domain Squatting: The Phisher-man’s Friend

    Domain Squatting: The Phisher-man’s Friend

    Simon talks about how easy it is to conduct domain squatting and typosquatting, and how little monitoring still goes on around them in the industry.

    Read Post
  • Detecting Spoof Domains - Domain Infringement | Case Study

    Detecting Spoof Domains - Domain Infringement | Case Study

    See how one global retailer detected almost 2,000 domains impersonating their brand.

    Read Report
  • Dark Web Typosquatting: Scammers v. Tor

    Dark Web Typosquatting: Scammers v. Tor

    Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...

    Read Post
  • ANU Breach Report: Mapping to Mitre ATT&CK Framework

    ANU Breach Report: Mapping to Mitre ATT&CK Framework

    We decided to map this intrusion to the Mitre ATT&CK framework, as we have done previously for:

    Read Post
  • 5 Ways Cybercriminals Can Access Your Emails Without Phishing

    5 Ways Cybercriminals Can Access Your Emails Without Phishing

    Here are 5 ways that cybercriminals gain access to emails without conducting a phishing campaign or network intrusion.

    Read Report
  • Phishing Site Impersonates Financial Services Institution

    Phishing Site Impersonates Financial Services Institution

    If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention ...

    Read Post
  • Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.

    Read Post
  • Weekly Intelligence Summary 03 Oct - 10 Oct 2019

    Weekly Intelligence Summary 03 Oct - 10 Oct 2019

    In the spotlight this week is the Iran-linked threat group “APT35”, which took aim at the email accounts of political entities in the United States and prominent Iranians living outside Iran.

    Read Report
  • Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories. - APT35 Targets Email of US political figures & prominent Iranians -...

    Read Post
  • Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    How can the modern network of .onion marketplaces be understood through novels about a cyberpunk dystopia? The answer is in how dark web marketplaces grow and die.

    Read Post
  • Texas Ransomware Outbreaks And Phishing Attacks Using Custom 404 Pages

    Texas Ransomware Outbreaks And Phishing Attacks Using Custom 404 Pages

    Charles Ragland (a brand new ShadowTalk-er!) and Christian Rencken join Harrison this week to discuss an outbreak of ransomware attacks impacting local government entities across Texas. The team...

    Read Post
  • Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

    Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

    Since Facebook’s announcement on June 18, there has been a gold rush, with people scrambling to register a myriad of domain permutations that infringe on the new trademarks. These have ranged from see

    Read Post
  • Detecting Fake Social Media Profiles | Case Study

    Detecting Fake Social Media Profiles | Case Study

    See how a bank removed a spoof social media profiles targeting customers.

    Read Report
  • Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

    Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

    Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into ...

    Read Post
  • Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity

    Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity

    This week Alex and Jamie (@TheCollierJam) chat with Harrison (@pseudohvr) on a cyber-threat campaign involving the abuse of legitimate features in Google Calendar. Then they dive into other...

    Read Post
  • Online Brand Security Overview

    Online Brand Security Overview

    Cybercriminals impersonate your brand by registering spoof domains, social media accounts, and mobile applications. SearchLight enables you to detect Domain Impersonation, Malicious Mobile Apps...

    Read Report
  • Episode 36: FIN7 Arrests and Phishing Threats

    Episode 36: FIN7 Arrests and Phishing Threats

    Digital Shadows’ Rose Bernard and Simon Hall join Rafael Amado to cover the arrest of three alleged members of the FIN7 organized criminal group. The team go over the United States Department of...

    Read Post
  • Five Threats to Financial Services: Phishing Campaigns

    Five Threats to Financial Services: Phishing Campaigns

    In our last blog, we highlighted how banking trojans are a threat to banking customers and small businesses, normally delivered ...

    Read Post
  • loading
    Loading More...