tag = "Cyber Threat"

3 Strategies to Enhance Brand Threat Intelligence

In order to protect their organizations, security teams should prioritize efforts to proactively detect brand abuse.

New Quarterly Threat Trends & Intelligence Report Now Available

Phishing volume in 2021 continues to outpace last year by 22%, according to PhishLabs Quarterly Threat Trends & Intelligence Report.

OSINT: How Usernames Unlock Investigations

Usernames can hold meaning to the individual, and as a result provide useful information when expanding investigations to different social platforms.

Threat Evasion Techniques: Restricting by Interaction

Threat actors improve the resiliency of phishing campaigns by concealing malicious content from security teams. In this post we discuss active evasion, restricting by interaction.

Threat Evasion Techniques: Restricting By Device

Cybercriminals use evasion techniques to extend the life of phishing campaigns. In this post we discuss active evasion, restricting non-targets by device.

Threat Evasion Techniques: Restricting by Location

Evasion techniques are methods attackers deploy to extend the life of phishing campaigns. In this post, we take a look at active evasion techniques restricting non-targets by location.