The Ecosystem of Phishing: From Minnows to Marlins
$1 for a cheap domain. $12.99 for 10m email contacts. Cybercriminals can launch phishing campaigns for under $20!
Read Post
Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground
we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat
Read Post
Combatting Domain-Centric Fraud: Why Mimecast is partnering with Digital Shadows
The Digital Shadows service continually identifies when new potentially impersonating domains emerge, and provides a risk score based on contextual information such as whether the domain is hosting...
Read Post
The Complete Guide to Online Brand Protection
This blog will outline the top threats to brands we see online, and some of the best practices for protecting them.
Read Post
Dark Web Typosquatting: Scammers v. Tor
Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...
Read Post
Domain Squatting: The Phisher-man’s Friend
Simon talks about how easy it is to conduct domain squatting and typosquatting, and how little monitoring still goes on around them in the industry.
Read Post
Typosquatting and the 2020 U.S. Election, Honeypots, And Sudo Vulnerability
Kacey, Charles, Harrison, and Alex kick off this week’s episode talking about our Fall Dallas team event (an amateur version of Chopped). Then we dig into the hot topics of the week.
Read Post
ANU Breach Report: Mapping to Mitre ATT&CK Framework
We decided to map this intrusion to the Mitre ATT&CK framework, as we have done previously for:
Read Post
Phishing Site Impersonates Financial Services Institution
If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention ...
Read Post
Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It
We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.
Read Post
Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence
We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories.
- APT35 Targets Email of US political figures & prominent Iranians
-...
Read Post
Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction
How can the modern network of .onion marketplaces be understood through novels about a cyberpunk dystopia? The answer is in how dark web marketplaces grow and die.
Read Post
Texas Ransomware Outbreaks And Phishing Attacks Using Custom 404 Pages
Charles Ragland (a brand new ShadowTalk-er!) and Christian Rencken join Harrison this week to discuss an outbreak of ransomware attacks impacting local government entities across Texas. The team...
Read Post
Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor
Since Facebook’s announcement on June 18, there has been a gold rush, with people scrambling to register a myriad of domain permutations that infringe on the new trademarks. These have ranged from see
Read Post