Since September 21, PhishLabs analysts have detected a number of phishing sites hosted on emoji domains. Here's what we've learned so far.
Everybody knows that reported phishing emails are a valuable resource. But are you making maximum use of yours? This is how you can use reported phish to aid your threat hunting capability.
User-reported phishing emails are a huge asset in the fight against phishing. Here are six steps you can take to maximize the value of every reported phish.
Nigerian 419 scams are as old as the internet, and they're still going. Here's our #CyberAware take on this phishing classic.
In aid of national #CyberAware month, we take a close look at BEC phishing lures, how they work, and why they're so effective
A deep-dive malware analysis of the Qadars Banking Trojan and how it works.
The ease of buying low cost, pre-built tools broadens the range of potential targets in BEC attacks. This blog discusses one of these tools - Olympic Keylogger.
The full source code of the Dendroid Android RAT was leaked late last week. Analyzing the code has revealed multiple vulnerabilities due to lack of user input including XSS, SQLi, and PHP Code Execution.