BLOG

Articles about website spoofing, cybersecurity trends, and how to protect your customers from hackers.

10 - February 2020

The Five Stages of a Phishing Attack

Phishing attacks lure unsuspecting people to click on links that lead to realistic-looking fake pages (spoof websites). The goal: stealing the victim’s login credentials. This attack…

LEARN MORE
23 - January 2020

Domain Monitoring Isn’t Enough to Protect Your Customers from Phishing

Phishing is the most commonly used attack vector in cybersecurity breaches, according to the 2019 Verizon Data Breach Report. No one is safe from its effects—not…

LEARN MORE
16 - December 2019

It’s Time To Rethink Web Spoofing Detection And Response

It is time for defenders to rethink the way they have dealt with web spoofing. Why is it still possible for a company to have no idea that their site has been successfully spoofed?

LEARN MORE
31 - October 2019

Poisoning The Well: Deceive And Disrupt The Phishers

To shift the balance of power and finally gain an advantage over phishing schemes, defenders need to disrupt the economic advantage of the attacker. This means…

LEARN MORE
17 - October 2019

Déjà Vu All Over Again: Phishing Scheme Targets Presidential Candidates

The continued attempted hacks against computers used by the staff for political parties and citizen groups at the core of our deliberative political system is increasingly…

LEARN MORE
7 - October 2019

YouTube Data Breach Highlights 2FA Vulnerability And Victim-Blaming

The phishing scheme aimed at top YouTube content creators is a real-time case study in how these attacks are evolving and becoming more sophisticated. It also underscores that…

LEARN MORE

FOLLOW OUR BLOG

CONTACT US

Phone Number - (877) 669-8883