Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Phishing/malware

Latest blogs

Topic : Phishing/malware
  • --Any--
  • Anonymous research
  • Compliance
  • Cryptocurrency
  • Cybersecurity
  • Dark web basics
  • Dark web research
  • Digital fingerprint
  • Financial crime
  • Fraud and brand misuse
  • Law enforcement
  • OSINT news
  • OSINT research
  • Phishing/malware
  • Product info
  • Secure web access
  • SOC
  • Social media
  • Threat intelligence
  • Trust and safety
  • VPN
  • Zero-trust app access

Leveraging OSINT in risk assessment

Risk assessments are critical to business functions across the board. Learn what OSINT methodology and dozens of resources can bring to…

SOC analysts: 3 non-negotiable needs for online investigation

An unprecedented level of cyber attacks and phishing attempts makes the security needs of SOC teams greater than ever

How to use OSINT to uncover domain ownership: WHOIS, Reverse IP, and lookup techniques

Learn domain OSINT techniques to uncover the ownership of a website. Explore WHOIS lookups, reverse IP searches, and safe methods for…

Cybersecurity news roundup: ZeroFont, chatbot malvertising and a WebP zero-day

We’ve gathered the latest news on threats, malicious technology and cybersecurity advancements you need to know.

Foolproof security of user web activity

Even the most security-aware users make mistakes and can accidentally expose their organizations’ networks to malware and other…

A recent Google malvertising scheme highlights the need for secure research environment

Investigating a malvertising scheme that tricked one of the world’s largest search engines is a dangerous game. Here’s how to do so safely:

Why conducting sensitive online research from Starbucks is a bad idea

Free Wi-Fi may seem like a convenient way to alter your digital fingerprint and avoid tipping off investigative targets, but the risks…

Safely investigate phishing sites without getting hooked

Phishing sites commonly contain malicious content that can put SOCs and their organizations at risk as they conduct investigations. But…

5 Steps for secure malware analysis

Malware analysis is a tricky process. Incorrect handling leads to accidental self-exposure, which can be devastating depending on where the…

Blog updates

Stay updated with the latest posts from the blog
Close
Close