Tag: The PhishLabs Blog

APWG Year-End Report: 2019 A Roller Coaster Ride for Phishing

The latest Phishing Activity Trends Report from the Anti-Phishing Working Group (APWG), which compiles insights from member companies, announced that the year-end number of reported phishing websites for 2019 reached a record high. Most menacing; however, are the trends of…

Evasion Techniques: Geoblocking by IP

In order to increase the lifespan of their campaigns, most threat actors implement evasion techniques to keep their activity from being detected by defenders and their intelligence tools. In this blog post, we’ll take a look at how geoblocking by…

Phishing Threat Actor Blocking Techniques: Geoblocking by IP

In order to increase the lifespan of phishing attacks most threat actors implement evasion techniques to keep their phishing sites from being detected by security professionals.   Advertise on IT Security News. Read the complete article: Phishing Threat Actor Blocking…

Social Media Phishing: Beyond Credential Theft

In the past few weeks, our team highlighted how social media is abused by threat actors seeking to steal credentials and to administer phishing attacks. While these are both two of the most prominent cybersecurity threats distributed through social media,…

Threat Actor Abuses Mobile Sensor to Evade Detection

Every day our teams analyze millions of phish across the web, emails, social media, mobile, and most other common digital vectors. Many phishing sites are easy to review and analyze. However, some threat actors that we track take steps to…

The Training Evaluation Conundrum

Stakeholders expect to see a return on their investment in training. In some cases though, they struggle to conceptualize the best way to evaluate the effectiveness of their security awareness training. They are in good company. Training evaluations can be…