Recent Posts

Recent Blog Posts

The PhishLabs Blog

Gartner Releases Emerging Tech Report: Critical Insights into Digital Risk Protection

Posted by Tricia Harris on Aug 4, '20

Driven by expanding use cases, approachable intelligence, and the incorporation of premium services, demand for Digital Risk Protection Services (DRPS) has grown over the last 12 months and continues to increase.

Read More

Topics: Digital Risk Protection, DRP, Gartner

Account Takeover Attacks Cause Chaos @ Twitter

Posted by Stacy Shelley on Jul 16, '20

On Tuesday afternoon, dozens of high-profile Twitter accounts were hijacked to promote cryptocurrency scams. Threat actors took over the accounts of Elon Musk, Bill Gates, Barack Obama, Jeff Bezos, and many others. Corporate Twitter accounts were also hijacked, including those belonging to cryptocurrency companies. What does this mean for enterprises and their security teams?
Read More

Topics: Account Takeover, Social Media Monitoring, Digital Risk Protection, Social Media Threats, executive impersonation

Gartner Releases 2020 Hype Cycle for Security Operations

Posted by Elliot Volkman on Jul 14, '20

Digital Risk Protection has emerged as a critical new capability for security teams. It protects critical digital assets and data from external threats across surface, dark, and deep web sources.

Read More

Topics: Digital Risk Protection, DRP, Gartner

Spoofed Domains Present Multifaceted, Growing Problems for Enterprises

Posted by Jessica Ellis on Jul 9, '20

Threat actors are increasingly registering new domains to launch malicious campaigns against enterprises. Identifying suspicious domains, as well as monitoring existing ones for changes, is an overwhelming and reactive task for many organizations. In order to minimize the risk spoofed domains pose, security teams must be able to efficiently detect abuse and understand what is required to mitigate threats. 
Read More

Executive Impersonation Techniques on Social Media

Posted by Jessica Ellis on Jun 22, '20

Threat actors are masquerading as executives on social media for purposes of stealing credentials and damaging popular brands.  Today, many executives have accounts on these platforms to network as well as post content promoting their companies.
Read More

Topics: Social Media Threats

Abuse of HTTPS on Nearly Three-Fourths of all Phishing Sites

Posted by Elliot Volkman on Jun 16, '20

Since 2015, PhishLabs has and continues to track how threat actors abuse HTTPS or SSL certs. In particular, threat actors often use HTTPS on their phishing sites to add a layer of legitimacy, better mimic the target site in question, and reduce being flagged or blocked from some browsers. 

Read More

Topics: APWG, https

FBI Warns of Growing Mobile Banking App Threats

Posted by Jessica Ellis on Jun 12, '20

The Federal Bureau of Investigation (FBI) published a public service announcement Wednesday warning the public of anticipated cyber attacks that exploit increased usage of mobile banking apps. The advisory comes at a time when a vast majority of Americans are working from home due to social distancing, and as a result, rely more on mobile apps to do their banking. According to the report, there has been a 50% increase in mobile banking activity since the beginning of 2020. Threat actors are aware of this trend and are capitalizing on it.
Read More

Data Leakage on Social Media: Credit Card Info, Confidential Docs

Posted by Jessica Ellis on Jun 11, '20

When the term data leak comes to mind, most enterprises think of the dark web. Although compromised information can damage an organization when distributed through gated and anonymous platforms, we are seeing social channels being used to allow for a more rapid and potentially destructive outcome. These platforms have an overwhelming number of global participants, with almost half of the world’s population using some form of social media. Threat actors are aware of the massive audience this allows them to reach and as such, are using these channels to promote and expose confidential data. 
Read More

Topics: Social Media Threats

Social Media Platforms Latest Channels used to Leak Sensitive Data

Posted by Jessica Ellis on Jun 2, '20

Threat actors are using social media accounts to expose and sell data that has been compromised. While information found on many of these platforms has traditionally been disclosed by enterprises and individuals with intent, cyber criminals are taking information acquired by means of scams and data breaches and promoting their sale on various social platforms not always monitored by security teams.  
Read More

Topics: Social Media Threats

Threat Actors Impersonate Brands on Social Media for Malicious Purposes

Posted by Jessica Ellis on May 28, '20

With more than 2.95 billion people now estimated to use social media, an organization’s online presence directly relates to the satisfaction of its customers, as well as its profits. False or misleading images or comments connected with a brand on online platforms can swiftly impact the reputation or even financials of an otherwise successful company. 
Read More

Topics: Social Media Threats

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Recent Posts

Subscribe to Email Updates

Posts by Topic

see all