Phish in a Barrel: Hunting and Analyzing Phishing Kits at Scale
In a technical paper released today, Duo Labs details the results of a month-long experiment in which we hunted and analyzed over 3,200 unique phishing kits.
24 Articles Found
In a technical paper released today, Duo Labs details the results of a month-long experiment in which we hunted and analyzed over 3,200 unique phishing kits.
We're excited to announce two new open-source tools designed to help administrators prevent, manage, and respond to phishing attacks against their organization - IsThisLegit and Phinn.
A Gmail phishing attack leveraging OAuth spread quickly to multiple users. Learn what made this attack incredibly successful, as well as ways to protect yourself or your employees.
An attacker can send phishing dialogs to users by writing a few lines of AppleScript, effectively allowing them to steal Apple ID or local user account credentials. Here’s our technical overview of the dangers of AppleScript.
Duo Security Presents...the Access of Evil. These miscreants want all your data and they’ve honed their skills to get access. These are their stories and villainous deeds of the past year - these are the different types of hacks to watch out for.