The dangerous impact of typosquat domains, and how frequently…
0 results for keyword ""
Widespread Brand Impersonation Scam Campaign Targeting Hundreds of the Most Popular Apparel Brands
Bolster’s threat research team recently uncovered a widespread brand…
Compare the Top 8 Open Source Phishing Threat Intel Feeds
Phishing threats evolve and adapt quickly. Even before one…
Web Beacons: How To Effectively Use Them For Phishing Detection
Phishing attacks are the most common attack vector for…
How Scammers Use Google Ads to Target Brands & Customers
Did you know, that scammers can weaponize Google Ads…
How SSL Monitoring Can Help Safeguard Your Brand’s Identity
Phishing and scam websites often use SSL certificates to…
SEO Poisoning Attack Linked to 144,000 Phishing Packages
Introduction In a recent incident involving the NuGet, PyPI, and…
Customer Support Impersonation Scams on Twitter
Many companies use social media platforms as an outlet…
How Scammers Use Google Ads to Target Brands & Customers
Did you know, that scammers can weaponize Google Ads…
Using Favicons to Discover Phishing & Brand Impersonation Websites
Almost every website on the internet, including phishing sites,…