62% of Phishing Sites Abuse Free Tools or Services

62% of Phishing Sites Abuse Free Tools or Services

In Q1, PhishLabs analyzed hundreds of thousands of phishing attacks and found more than 62% abused legitimate no-cost tools or services.  ... Read More
47% Phishing Increase in Q1

47% Phishing Increase in Q1

Phishing is on the rise. PhishLabs identified 47% more phishing sites in Q1 of 2021 than there were in Q1 of 2020.  This trend is continuing as Q2 attacks are also up significantly year-over-year ... Read More
Most Phishing Attacks Use Compromised Domains and Free Hosting

Most Phishing Attacks Use Compromised Domains and Free Hosting

| | domains
To stage a phishing site, cybercriminals have several options. They can use a legitimate domain that has been compromised, they can abuse free hosting services, or they can register their own domain. Understanding the prevalence of each scenario is fundamental to detecting and mitigating these threats as early in the ... Read More
OSINT: Mapping Threat Actor Social Media Accounts

OSINT: Mapping Threat Actor Social Media Accounts

| | OSINT
A threatening social media post targeting an executive, employee, brand, or any other asset often has merit to it, and investigating the online accounts associated with the threat actor is imperative in the process of assessing risk. By mapping social media accounts operated by the threat actor, you can build ... Read More
Look-alike Domain Mitigation: Breaking Down the Steps

Look-alike Domain Mitigation: Breaking Down the Steps

|
Look-alike domains remain some of the most consistent elements of cyber attacks targeting organizations. At a high-level, there are two ways to mitigate the threat of a look-alike domain: remove the threat completely by taking it offline, or block attacks on your users by implementing IT security controls. If we ... Read More
The Year In Review: How COVID-19 Has Changed Cyber Security

The Year In Review: How COVID-19 Has Changed Cyber Security

| | COVID-19
The novel coronavirus has dominated 2020, and in the cyber community, threat actors have capitalized on its impact from the beginning. In early March we saw the first of what would be an onslaught of criminal activity using the pandemic to manipulate users, and over the course of the year ... Read More
Top 7 Use Cases for Digital Risk Protection

Top 7 Use Cases for Digital Risk Protection

| | Digital Risk Protection, DRP
Today’s enterprises are experiencing an accelerated digital transformation due to the pandemic, and adoption of initiatives that would normally span years are being fast-tracked to support remote workforces and transition to new platforms. The external digital landscape is also rapidly expanding, and organizations are being required to conduct business more ... Read More
Loading...