The latest Phishing Activity Trends Report from the Anti-Phishing Working Group (APWG), which compiles insights from member companies, announced that the year-end number of reported phishing websites for 2019 reached a record high. Most menacing; however, are the trends of…
Tag: The PhishLabs Blog
Evasion Techniques: Geoblocking by IP
In order to increase the lifespan of their campaigns, most threat actors implement evasion techniques to keep their activity from being detected by defenders and their intelligence tools. In this blog post, we’ll take a look at how geoblocking by…
Phishing Threat Actor Blocking Techniques: Geoblocking by IP
In order to increase the lifespan of phishing attacks most threat actors implement evasion techniques to keep their phishing sites from being detected by security professionals. Advertise on IT Security News. Read the complete article: Phishing Threat Actor Blocking…
Breakfast, Lunch, and Bourbon at RSA Conference 2020
Heading to RSA in a few weeks? If you are, be sure to spend some time with PhishLabs while you’re there. This year we are hosting several events for security leaders and practitioners. Come relax with a glass of quality…
Breakfast, Lunch, and Bourbon at RSA Conference 2020
Heading to RSA in a few weeks? If you are, be sure to spend some time with PhishLabs while you’re there. This year we are hosting several events for security leaders and practitioners. Come relax with a glass of quality…
Social Media Phishing: Beyond Credential Theft
In the past few weeks, our team highlighted how social media is abused by threat actors seeking to steal credentials and to administer phishing attacks. While these are both two of the most prominent cybersecurity threats distributed through social media,…
Why You Should Take Social Media Account Takeover as Seriously as a BEC Attack
Social media account compromise is nothing new. If you haven’t had an account hacked in the past, most of us know someone who has. According to a study by the University of Phoenix, almost two-thirds of US adults have had…
SIM Swap Attacks are making SMS Two-Factor Authentication Obsolete
On August 30, Twitter CEO Jack Dorsey became the most notable victim of one of the fastest-growing cyber threats: SIM Swapping. SIM Swap Attacks are increasing because they only require social engineering and access to a SIM card, which makes…
New Webinar: Inside the World of Social Media Phishing: Financial Scams
On a daily basis, most people will use some form of social media. From checking photos of your friends and pets, to communicating with coworkers and loved ones, social media is a large part of the connected world. Unfortunately, this…
New Webinar: Inside the World of Social Media Phishing: Financial Scams
On a daily basis, most people will use some form of social media. From checking photos of your friends and pets, to communicating with coworkers and loved ones, social media is a large part of the connected world. Unfortunately, this…
Threat Actor Abuses Mobile Sensor to Evade Detection
Every day our teams analyze millions of phish across the web, emails, social media, mobile, and most other common digital vectors. Many phishing sites are easy to review and analyze. However, some threat actors that we track take steps to…
New White Paper: BEC Attacks are the Most Costly Form of Phishing
Business Email Compromise (BEC) attacks have plagued organizations all over the world for almost a decade. In fact, the phishing threat has become so pervasive and effective for threat actors that the reported losses to date have already hit more…
The Training Evaluation Conundrum
Stakeholders expect to see a return on their investment in training. In some cases though, they struggle to conceptualize the best way to evaluate the effectiveness of their security awareness training. They are in good company. Training evaluations can be…