domains
APWG Q3 Report: Four Out of Five Criminals Prefer HTTPS
The Anti-Phishing Working Group (APWG), known for its collaborative analysis of phishing attacks and identify theft techniques, has released its Phishing Activity Trends Report for Q3 of 2020. Highlights from the report ...
Easy to Deceive, Difficult to Detect, Impersonation Dominates Attacks
Impersonation enables threat actors to manipulate victims into disclosing sensitive information as well as enhance their ability to commit fraud. An organization's name, logo, or messaging can be incorporated into almost any ...
What is a Look-alike Domain?
By definition, a look-alike domain is a nearly identical, slightly altered domain name, registered with intent to deceive ...
Planetary Reef: Cybercriminal Hosting and Phishing-as-a-Service Threat Actor
PhishLabs is monitoring a threat actor group that has set up fraudulent hosting companies with leased IP space from a legitimate reseller. They are using this infrastructure for bulletproof hosting services as ...
Eliminating the Threat of Look-alike Domains
There are many ways look-alike domains can be used by threat actors. While business email compromise (BEC) and phishing sites are often top-of-mind for defenders, there are dozens of other uses for ...
How to Detect Look-alike Domain Registrations
Malicious domains are attributed to a wide variety of cyber attacks capable of undermining a brand’s credibility. A spoofed domain is easy and quick to create, and can act as the catalyst ...
APWG: SSL Certificates No Longer Indication of Safe Browsing
The Anti-Phishing Working Group (APWG) has released its Phishing Activity Trends Report analyzing phishing attacks and identifying theft techniques reported by its members for Q2 of 2020. Key highlights of the report ...
Separating Subdomains From Third-Party Hosted WWW Domains
Setting cookies on domains that have multiple subdomains can pose security risks if it is implemented incorrectly. An attacker who gains access to a particular domain can conduct a session fixation attack ...

