Digital Risk Protection
Easy to Deceive, Difficult to Detect, Impersonation Dominates Attacks
Impersonation enables threat actors to manipulate victims into disclosing sensitive information as well as enhance their ability to commit fraud. An organization's name, logo, or messaging can be incorporated into almost any ...
What is a Look-alike Domain?
By definition, a look-alike domain is a nearly identical, slightly altered domain name, registered with intent to deceive ...
Ransomware Groups Break Promises, Leak Data Anyway
While paying ransoms to cybercriminals remains very controversial, the trend of ransomware groups threatening to leak sensitive data has added another layer of complexity to an already difficult decision. Should organizations pay ...
Top 7 Use Cases for Digital Risk Protection
Today’s enterprises are experiencing an accelerated digital transformation due to the pandemic, and adoption of initiatives that would normally span years are being fast-tracked to support remote workforces and transition to new ...
Limited Impact of Phishing Site Blocklists and Browser Warnings
The life of a phishing site is brief, but impactful. A study published earlier this year found the average time span between the first and last victim of a phishing attack is ...
What is Digital Risk Protection?
Today’s enterprise attack surface is not limited to the corporate network. In fact, the network is just a small slice. When it comes to deciding how and where to attack an enterprise, ...
Digital Risk Protection vs. Threat Intelligence
Digital Risk Protection (DRP) continues to gain momentum and attention among CISOs and security professionals. DRP, an operational security function once classified under Threat Intelligence (TI), has been elevated by the Gartner ...
Social Media Intelligence: Cutting Through the Noise
Social media is rapidly becoming the preferred online channel for threat actors. Almost four billion people use some form of social media, and organizations are increasingly reliant on company pages, executive presence, ...
Royal Ripper: Multi-Stage Phishing Attack Adapts to Victim Input
PhishLabs is monitoring a multi-stage phishing campaign that impersonates government entities and telecoms to target financial institutions and their customers. The threat actor behind the attacks has been designated Royal Ripper. The ...
Data Leaks in 2020: Accelerated Digital Transformation Exposes Enterprises
The digital presence of today's enterprise looks very different than it did earlier in the year. The COVID-19 pandemic is forcing rapid change on how many businesses use technology. From transitioning to ...

