Profile cover photo
Profile photo
TZ- Security

Phishing, Spear phishing, Whaling, Voice Phishing, SMiShing

#Phishing #Malware #CyberSecurity

First part of analyzing phishing pages was more in technical nature. This part will be more diverse, with screenshots taken during research and comments explaining some findings.

#cybersecurity #Phishing #Malware

Last few days I am analyzing a lot of phishing pages and phish-packs, in order to find the most used keywords, functions, emails used by phishers and other stuff useful for my scanners. I have acquired various phishing pages and packs from various places and what is interesting (but not surprising) – almost all of them are backdoored. Here is a part of my findings, hopefully useful for non-technical people who need to deal with their hacked servers and recognize similar codes and backdoors.

#Phishing #Malware #CyberSecurity
Wait while more posts are being loaded