Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Phishing/malware

Latest blogs

Topic : Phishing/malware
  • --Any--
  • Anonymous research
  • Compliance
  • Cryptocurrency
  • Cybersecurity
  • Dark web basics
  • Dark web research
  • Digital fingerprint
  • Financial crime
  • Fraud and brand misuse
  • Law enforcement
  • OSINT news
  • OSINT research
  • Phishing/malware
  • Product info
  • Secure web access
  • SOC
  • Social media
  • Threat intelligence
  • Trust and safety
  • VPN
  • Zero-trust app access

SOC analysts: 3 non-negotiable needs for online investigation

An unprecedented level of cyber attacks and phishing attempts makes the security needs of SOC teams greater than ever

Safely investigate phishing sites without getting hooked

Phishing sites commonly contain malicious content that can put SOCs and their organizations at risk as they conduct investigations. But…

5 Steps for secure malware analysis

Malware analysis is a tricky process. Incorrect handling leads to accidental self-exposure, which can be devastating depending on where the…

generia blog

Combating malware in 2020: process, trends and tools

Adversaries are continuously honing their skills, planning for their next attack. How to stay one step ahead? The right framework prepares…

generia blog

Research: More worries with Wasm

In many web browsers, the WebAssembly programming language is taking over execution tasks that were once exclusively the domain of…

Blog updates

Stay updated with the latest posts from the blog
Close
Close