Recent Posts

Recent Blog Posts

The PhishLabs Blog

Targeting the Brand: Your C-Suite May Be at Risk

Posted by Elliot Volkman on Sep 19, '18

Social media is impacting the world around us.

Most organizations have social media accounts, cloud-based drives, access cloud platforms, are filled with employees who use messengers like Slack, and tap into any other piece of the ever expanding digital world.

Because of the growth rate of each of these types of technology and the associated user adoption, ideal security best practices and tools are still sorely lagging behind in place of innovation. Because of this, any user, and in particular executives or the C-suite with keys to the castle, are constantly a potential target to threat actors.

Read More

Topics: Executive Monitoring, Digital Risk Protection

The Light in the Dark: Myths and Truths about the Dark Web

Posted by Alexa Villanueva on Sep 11, '18

There are many misconceptions about the dark web and what goes on in the digital underground. Though the dark web is usually associated with criminal activities including drug dealing, human trafficking, selling counterfeit consumer goods and many other malicious acts, not everything in the dark web is completely dark.

Read More

Phishing 101: Targeted Phishing Attacks

Posted by Alexa Villanueva on Sep 5, '18


The most likely way that you will be compromised online is through a simple phish or a socially engineered attack. Today, these two techniques are often combined to create an even more threatening attack, an intelligently targeted phish.

Read More

Defining and Managing Success for Security Teams

Posted by Elliot Volkman on Aug 30, '18

Big or small, global or local, almost every organization uses some form of technology, and therefore has security needs within it. Due to the nature of the work and variables in play, metrics and success are often a subjective matter from organization to organization.

Read More

Topics: Digital Risk Protection

Geolocation Tracking Poses Risks to Your Employees

Posted by Alexa Villanueva on Aug 21, '18

Exposing your geolocation information publicly can lead to increased personal and business risk. This is particularly important to note in the wake of Google's location tracking, even if you explicitly told them not to.

Read More

Topics: Digital Risk Protection

So You Got a SaaS Security Awareness Training Platform, Now What?

Posted by Elliot Volkman on Aug 14, '18

After months of talks, budget approvals, and getting stakeholder buy in, you finally have the security awareness tool of your choice ready to be used. You get some welcome emails, an onboarding conversation with a customer account manager, and then…..?

Read More

Topics: Awareness Training, security awareness training

BankBot Anubis Still a Threat, Gets Upgrade

Posted by Joseph Fleming on Aug 8, '18

Over the past few years mobile banking trojans have been a persistent threat.

While Windows desktops and laptops once made up the lion’s share of Internet traffic, mobile devices (particularly Android) have long since become the most common means of browsing the web.

With banking trojans now incorporating such a wide range of malicious functionality, it’s hardly surprising they have become a favorite among malicious actors.

Read More

Topics: BankBot Anubis

Phishing and Social Media, Will it Over Take Email?

Posted by Elliot Volkman on Aug 7, '18

Each year in our Phishing Trends and Intelligence (PTI) report our team highlights the continued growth and impact email-based phishing attacks continue to have on brands and people around the globe. In following these trends, email-based attacks are still steadily growing in numbers; however, this begs the question of what the future holds.

More specifically, at what point will phishing emails plateau and something else take its place?

Read More

Topics: Social Media Monitoring

The Perils of Public Wifi

Posted by Alexa Villanueva on Aug 2, '18

In today’s 24/7 world, whether you are in the car, on the road, on vacation, out to lunch or dinner or even on a plane, connectivity is assumed. Often getting connected is one of the first priorities when you arrive at a new place, but using a public wifi network carries some risk. The very same qualities that make public wifi the network with access to much of the information that is on your device. When you communicate over the network, others can be listening in….

Read More

How To Write Social Media Policies Designed to Reduce Digital Risks

Posted by Elliot Volkman on Jul 31, '18

Most organizations already have policies and procedures in place to encourage your employees to act in a professional manner while at work. But in our modern connected age, social media makes it easier than ever for anyone tied to your brand to be a vocal representation of who you are and what you do.

Read More

Topics: social media, Social Media Monitoring, Digital Risk Protection


What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Recent Posts

Upcoming Events


Posts by Topic

see all