We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!
Phishing is the fraudulent use of electronic communications to deceive users through spoofing, website forgery, redirectors or infected attachments.
From a threat intelligence perspective, this post presents the Tactic, Technique and Procedure (TTP), which can be best described as Living Off The Land at Scale (LOTLS).
Phishing threats are not homogeneous in nature. Malicious actors use several different phishing attack topologies to execute their campaigns – each of which require a different approach to detect and mitigate the threat.
Lured by the growing success of SMS, MMS and RCS mobile marketing platforms, cyber criminals take advantage of user behavior to expand SMS threat landscape.
Phishing remains a top cyber threat. Sophisticated scams are very easy to execute and highly profitable. Here are the top phishing trends in 2020 to watch.
The emerging cybercrime trend of diversifying attack targets demonstrates how criminals are increasingly able to detect and exploit new vulnerabilities.
Phishing attacks increasingly focus on people because the human layer is easily exploited. Here are 3 ways to fortify your defenses against phishing.
Read the top actionable steps you can take to combat phishing attacks. Cybersecurity Awareness Month is the perfect time to take action with 3 key things you can start doing right now.
The adoption of single-use phishing URLs is driving new demand for zero-second detections to keep up with the dwindling lifespan of phishing sites.
We’re excited to announce our latest malicious detection data service, PhishBlocklist™. Powered by our newly launched “Angler” Phishing Detection System, PhishBlocklist is designed to provide the industry’s most advanced and effective source for active and emerging phishing URLs—including zero-hour threats that APWG, Phishtank, and other services haven’t detected.Details