Easy to Deceive, Difficult to Detect, Impersonation Dominates Attacks

Easy to Deceive, Difficult to Detect, Impersonation Dominates Attacks

Impersonation enables threat actors to manipulate victims into disclosing sensitive information as well as enhance their ability to commit fraud. An organization's name, logo, or messaging can be incorporated into almost any ...
What is a Look-alike Domain?

What is a Look-alike Domain?

By definition, a look-alike domain is a nearly identical, slightly altered domain name, registered with intent to deceive ...
Ransomware Groups Break Promises, Leak Data Anyway

Ransomware Groups Break Promises, Leak Data Anyway

While paying ransoms to cybercriminals remains very controversial, the trend of ransomware groups threatening to leak sensitive data has added another layer of complexity to an already difficult decision. Should organizations pay ...
Top 7 Use Cases for Digital Risk Protection

Top 7 Use Cases for Digital Risk Protection

| | Digital Risk Protection, DRP
Today’s enterprises are experiencing an accelerated digital transformation due to the pandemic, and adoption of initiatives that would normally span years are being fast-tracked to support remote workforces and transition to new ...
Limited Impact of Phishing Site Blocklists and Browser Warnings

Limited Impact of Phishing Site Blocklists and Browser Warnings

The life of a phishing site is brief, but impactful. A study published earlier this year found the average time span between the first and last victim of a phishing attack is ...
What is Digital Risk Protection?

What is Digital Risk Protection?

Today’s enterprise attack surface is not limited to the corporate network. In fact, the network is just a small slice. When it comes to deciding how and where to attack an enterprise, ...
Digital Risk Protection vs. Threat Intelligence

Digital Risk Protection vs. Threat Intelligence

Digital Risk Protection (DRP) continues to gain momentum and attention among CISOs and security professionals. DRP, an operational security function once classified under Threat Intelligence (TI), has been elevated by the Gartner ...
Social Media Intelligence: Cutting Through the Noise

Social Media Intelligence: Cutting Through the Noise

Social media is rapidly becoming the preferred online channel for threat actors. Almost four billion people use some form of social media, and organizations are increasingly reliant on company pages, executive presence, ...
Royal Ripper: Multi-Stage Phishing Attack Adapts to Victim Input

Royal Ripper: Multi-Stage Phishing Attack Adapts to Victim Input

| | Digital Risk Protection
PhishLabs is monitoring a multi-stage phishing campaign that impersonates government entities and telecoms to target financial institutions and their customers. The threat actor behind the attacks has been designated Royal Ripper. The ...
Data Leaks in 2020: Accelerated Digital Transformation Exposes Enterprises

Data Leaks in 2020: Accelerated Digital Transformation Exposes Enterprises

The digital presence of today's enterprise looks very different than it did earlier in the year. The COVID-19 pandemic is forcing rapid change on how many businesses use technology. From transitioning to ...