BLOG

Articles about website spoofing, cybersecurity trends, and how to protect your customers from hackers.

15 - April 2020

What’s in a Domain Name

Why DNS and Domain Monitoring Aren’t Reliable Ways to Detect Phishing Phishing is a successful way for cyber criminals to attack systems and monetize their gains.…

LEARN MORE
25 - March 2020

A Crisis Can Bring Out The Best In People

Thank you doctors, nurses, grocers, delivery drivers, pharmacists, and first responders! Thank you to those of you working in a NOC or a SOC keeping the…

LEARN MORE
17 - March 2020

How Malicious phishing sites are taking advantage of COVID-19 (Novel Coronavirus)

Attackers prey on customers I’ve written before about how adversaries exploit the trust customers have in well-known brands. Attackers specifically build spoof sites targeting well-known companies…

LEARN MORE
10 - February 2020

The Five Stages of a Phishing Attack

Phishing attacks lure unsuspecting people to click on links that lead to realistic-looking fake pages (spoof websites). The goal: stealing the victim’s login credentials. This attack…

LEARN MORE
23 - January 2020

Domain Monitoring Isn’t Enough to Protect Your Customers from Phishing

Phishing is the most commonly used attack vector in cybersecurity breaches, according to the 2019 Verizon Data Breach Report. No one is safe from its effects—not…

LEARN MORE
16 - December 2019

It’s Time To Rethink Web Spoofing Detection And Response

It is time for defenders to rethink the way they have dealt with web spoofing. Why is it still possible for a company to have no idea that their site has been successfully spoofed?

LEARN MORE

FOLLOW OUR BLOG

CONTACT US

Phone Number - (877) 669-8883