PhishingHighlighted January 22, 2021 Andrei Antipov Top 9 Phishing Simulators [Updated 2021] The title of this article was supposed to be “Top 10 Free Phishing Simulators”. However, after much searching, trying, visiting of broken links, filling...
Phishing December 29, 2020 Kurt Ellzey Phishing domain lawsuits and the Computer Fraud and Abuse Act The worlds of trademark law and marketing seem to be constantly at odds with each other, occasionally collapsing into a court of law where they battle for...
Phishing December 18, 2020 Greg Belding Phishing: Reputational damages When phishing and damages are thought of in the same sentence, the typical thoughts of many are the loss of data due to theft, identity theft and ultimately...
Phishing December 15, 2020 Rodika Tollefson Spearphishing meets vishing: New multi-step attack targets corporate VPNs Cybercriminals come out of the woodwork to take advantage of major events. Anything from the Olympics to the US elections is an opportunity to launch phishing...
Phishing November 17, 2020 Susan Morrow Phishing attack timeline: 21 hours from target to detection Phishing seems to be ever-present in the modern cyber-threat landscape. During the COVID-19 pandemic, there has even been an increase in phishing attacks...
Phishing November 2, 2020 Greg Belding Overview of phishing techniques: Brand impersonation Phishing emails are well known for using different flavors of trickery to cause users to bite on the proverbial lure. Perhaps the phishing technique that...
Phishing October 1, 2020 Howard Poston Cybercrime at scale: Dissecting a dark web phishing kit The internet is like an iceberg: there is a lot more to it than can be seen from the surface. In addition to the surface web (what can be accessed and indexed...
Phishing September 30, 2020 Howard Poston Lockphish phishing attack: Capturing Android PINs & iPhone passcodes over https Phishing attacks are a common tactic for gaining initial access to a system. If an attacker can convince their target to hand over their login credentials...
Phishing August 6, 2020 Pierluigi Paganini The Most Common Social Engineering Attacks [Updated 2020] In his book, “The Art of Deception,” popular hacker Kevin Mitnick explained the power of social engineering techniques. Today, we are aware that social...
Phishing July 6, 2020 Andrei Antipov 4 tips for phishing field employees [Updated 2020] Phishing is easy. Let’s just get that out of the way. It’s easy for an attacker, and, if you have the right tools (such as InfoSec Institute’s PhishSim),...