How Do Phishers Phish? Exploring Common Attack Techniques and Infrastructure | WhoisXML API

Webcasts

How Do Phishers Phish? Exploring Common Attack Techniques and Infrastructure

In this webcast, our panel of experts from WhoisXML API and Bayse Intelligence will look into attack infrastructure and showcase common tactics, techniques, and procedures (TTP) used in phishing campaigns. Unravel the mystery behind phishing attacks and learn how these crafty schemes can trick even the savviest netizens. Also understand how collaboration, data sharing, and advanced intelligence-led technologies are shaping the cybersecurity landscape.

Highlights from this Session:

  • Introduction to Bayse Intelligence
  • TTP #1 trending and hot topics – Analysis of cybersquatting domains and subdomains riding on the popularity of AI tools
  • TTP #2 leveraging trusted infrastructure – How malicious actors rely on third-party hosting to avoid immediate detection or blocking
  • TTP #3 website compromise – How legitimate business sites get under the control of malicious actors, unknowingly to the website owner
  • Speaker insights into the importance of collaboration and data sharing

  • WXA Webinar Host: Tara Conneally
  • Featured Speakers: David Pearson (Bayse Intelligence Founder, bayse.io), Ed Gibbs (WXA Field CTO), Alexandre Francois (WXA Head of Marketing & Security researcher)

Try our WhoisXML API for free
Get started