Phishing Protection

Discover attackers impersonating your domains, social accounts, and mobile applications.

  • Phishing Protection

    Phishing Protection

    Discover attackers impersonating your domains, social accounts, people, and mobile applications.

    Read Report
  • ×

    Live Webinar w/ FBI Cyber Division
    Aug 28:

    Your Data at Risk

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 August - Your Data at Risk Webinar
    Thank you!
    Error - something went wrong!
  • Detecting Spoof Domains - Domain Infringement | Case Study

    Detecting Spoof Domains - Domain Infringement | Case Study

    See how one global retailer detected almost 2,000 domains impersonating their brand.

    Read Report
  • 5 Ways Cybercriminals Can Access Your Emails Without Phishing

    5 Ways Cybercriminals Can Access Your Emails Without Phishing

    Here are 5 ways that cybercriminals gain access to emails without conducting a phishing campaign or network intrusion.

    Read Report
  • Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

    Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

    Since Facebook’s announcement on June 18, there has been a gold rush, with people scrambling to register a myriad of domain permutations that infringe on the new trademarks. These have ranged from see

    Read Post
  • Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity

    Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity

    This week Alex and Jamie (@TheCollierJam) chat with Harrison (@pseudohvr) on a cyber-threat campaign involving the abuse of legitimate features in Google Calendar. Then they dive into other...

    Read Post
  • Detecting Fake Social Media Profiles | Case Study

    Detecting Fake Social Media Profiles | Case Study

    See how a bank removed a spoof social media profiles targeting customers.

    Read Report
  • Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

    Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

    Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into ...

    Read Post
  • Online Brand Security Overview

    Online Brand Security Overview

    Cybercriminals impersonate your brand by registering spoof domains, social media accounts, and mobile applications. SearchLight enables you to detect Domain Impersonation, Malicious Mobile Apps...

    Read Report
  • Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.

    Read Post
  • Phishing Site Impersonates Financial Services Institution

    Phishing Site Impersonates Financial Services Institution

    If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention ...

    Read Post
  • Episode 36: FIN7 Arrests and Phishing Threats

    Episode 36: FIN7 Arrests and Phishing Threats

    Digital Shadows’ Rose Bernard and Simon Hall join Rafael Amado to cover the arrest of three alleged members of the FIN7 organized criminal group. The team go over the United States Department of...

    Read Post
  • Five Threats to Financial Services: Phishing Campaigns

    Five Threats to Financial Services: Phishing Campaigns

    In our last blog, we highlighted how banking trojans are a threat to banking customers and small businesses, normally delivered ...

    Read Post
  • loading
    Loading More...