HackDig : Dig high-quality web security articles for hackers

What is a Look-alike Domain?

<p><span><img src="https://info.phishlabs.com/hs-fs/hubfs/What%20is%20a%20look-alike%20domain%20v2.jpg?width=1600&amp;name=What%20is%20a%20look-alike%20domain%20v2.jpg" alt="What is a look-alike domain?" width="1600" style="width: 1600px; margin: 0px 0px 20px;"></span><span>By definition, a look-alike domain is</span>
Publish At:2020-11-25 17:17 | Read:97 | Comments:0 | Tags:Digital Risk Protection Domains

Ransomware Groups Break Promises, Leak Data Anyway

<div> <img src="https://info.phishlabs.com/hs-fs/hubfs/Ransomware%20Groups%20Break%20Promises,%20Leak%20Data%20Anyway.jpg?width=1600&amp;name=Ransomware%20Groups%20Break%20Promises,%20Leak%20Data%20Anyway.jpg" alt="Ransomware Groups Break Promises, Leak Data Anyway" width="1600" style="width: 1600px; margin: 0px 0px 20px;"> </div>
Publish At:2020-11-19 16:59 | Read:167 | Comments:0 | Tags:Ransomware Digital Risk Protection Email Intelligence &

Top 7 Use Cases for Digital Risk Protection

<div> <p><img src="https://info.phishlabs.com/hs-fs/hubfs/Top%207%20Use%20Cases%20for%20Digital%20Risk%20Protection.jpg?width=1600&amp;name=Top%207%20Use%20Cases%20for%20Digital%20Risk%20Protection.jpg" alt="Top 7 Use Cases for Digital Risk Protection" width="1600" style="width: 1600px; margin: 0px 0px 20px;"></p> <p>T
Publish At:2020-11-17 18:11 | Read:141 | Comments:0 | Tags:Digital Risk Protection DRP

Limited Impact of Phishing Site Blocklists and Browser Warnings

<p>The life of a phishing site is brief, but impactful. A <a href="https://www.usenix.org/system/files/sec20-oest-sunrise.pdf">study</a> published earlier this year found the average time span between the first and last victim of a phishing attack is just 21 hours. &nbsp;The same study observed the average phishing site shows up in indu
Publish At:2020-11-06 12:45 | Read:132 | Comments:0 | Tags:Phishing Digital Risk Protection

What is Digital Risk Protection?

<div> Today’s enterprise attack surface is not limited to the corporate network. In fact, the network is just a small slice. When it comes to deciding how and where to attack an enterprise, threat actors have ample opportunity beyond the network perimeter. As a result, enterprises are investing in operational capabilities to detect and respond to ext
Publish At:2020-10-15 14:15 | Read:205 | Comments:0 | Tags:Digital Risk Protection DRP

Digital Risk Protection vs. Threat Intelligence

<div> Digital Risk Protection (DRP) continues to gain momentum and attention among CISOs and security professionals. DRP, an operational security function once classified under Threat Intelligence (TI), has been elevated by the Gartner Hype Cycle and other analyst research as an emerging security function that security teams rely on to address multip
Publish At:2020-10-09 14:40 | Read:270 | Comments:0 | Tags:Threat Intelligence Digital Risk Protection DRP

Social Media Intelligence: Cutting Through the Noise

<div> Social media is rapidly becoming the preferred online channel for threat actors. Almost <a href="https://hootsuite.com/newsroom/press-releases/digital-2020-social-media-use-spans-almost-half-global-population">four billion </a>people use some form of social media, and organizations are increasingly reliant on company pages, execu
Publish At:2020-10-02 11:04 | Read:243 | Comments:0 | Tags:Digital Risk Protection Social Media Threats

Royal Ripper: Multi-Stage Phishing Attack Adapts to Victim Input

<div> PhishLabs is monitoring a multi-stage phishing campaign that impersonates government entities and telecoms to target financial institutions and their customers. The threat actor behind the attacks has been designated Royal Ripper. The initial stage of the attack harvests personal information and the sort code of the victim’s bank. It then uses
Publish At:2020-09-30 12:14 | Read:222 | Comments:0 | Tags:Digital Risk Protection

Data Leaks in 2020: Accelerated Digital Transformation Exposes Enterprises

<div> The digital presence of today's enterprise looks very different than it did earlier in the year. The COVID-19 pandemic is forcing rapid change on how many businesses use technology. From transitioning to remote workforces to delivering new online services, digital transformation initiatives that would normally span years are happening in weeks
Publish At:2020-08-20 14:35 | Read:559 | Comments:0 | Tags:Data Breach Digital Risk Protection Data Leak Detection Data

Gartner Releases Emerging Tech Report: Critical Insights into Digital Risk Protection

<p>Driven by expanding use cases, approachable intelligence, and the incorporation of premium services, demand for Digital Risk Protection Services (DRPS) has grown over the last 12 months and continues to increase.</p> <div> <p>In <a href="https://info.phishlabs.com/gartner-digital-risk-protection-emerging-technologies">G
Publish At:2020-08-04 17:48 | Read:560 | Comments:0 | Tags:Digital Risk Protection DRP Gartner

Account Takeover Attacks Cause Chaos @ Twitter

<div> On Tuesday afternoon, dozens of high-profile Twitter accounts were hijacked to promote cryptocurrency scams. Threat actors took over the accounts of Elon Musk, Bill Gates, Barack Obama, Jeff Bezos, and many others. Corporate Twitter accounts were also hijacked, including those belonging to cryptocurrency companies. What does this mean for enter
Publish At:2020-07-16 18:14 | Read:612 | Comments:0 | Tags:Account Takeover Social Media Monitoring Digital Risk Protec

Gartner Releases 2020 Hype Cycle for Security Operations

<p>Digital Risk Protection has emerged as a critical new capability for security teams. It protects critical digital assets and data from external threats across surface, dark, and deep web sources.</p> <p>In Gartner’s latest Hype Cycle for Security Operations, the author writes “This technology accelerates the breadth and depth of prote
Publish At:2020-07-14 12:11 | Read:430 | Comments:0 | Tags:Digital Risk Protection DRP Gartner

Why You Should Take Social Media Account Takeover as Seriously as a BEC Attack

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Social%20BEC.png?width=300&amp;name=Social%20BEC.png" alt="Social BEC" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">Social media account compromise is nothing new. If you haven’t had an account hacked in the past, most of us know someone who has. According to a
Publish At:2020-01-24 10:40 | Read:1017 | Comments:0 | Tags:social media Digital Risk Protection

New Webinar: Inside the World of Social Media Phishing: Financial Scams

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/SM%20Phishing%20Webinar%20(2).png?width=300&amp;name=SM%20Phishing%20Webinar%20(2).png" alt="SM Phishing Webinar (2)" width="300" style="width: 300px; float: right; margin: 0px 10px 10px 0px;"></p> <p>On a daily basis, most people will use some form of social media. From checki
Publish At:2020-01-14 16:20 | Read:847 | Comments:0 | Tags:Phishing social media Digital Risk Protection

Threat Actor Abuses Mobile Sensor to Evade Detection

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Mobile%20Sensors%20(1).png?width=300&amp;name=Mobile%20Sensors%20(1).png" alt="Mobile Sensors (1)" width="300" style="width: 300px; margin: 0px 0px 10px 10px; float: right;">Every day our teams analyze millions of phish across the web, emails, social media, mobile, and most other common digi
Publish At:2020-01-09 16:15 | Read:895 | Comments:0 | Tags:Digital Risk Protection

Tools