PhishFort

456 posts

PhishFort banner
PhishFort

PhishFort

@PhishFort

Phishing and brand protection. Safeguarding customers, brand equity, and revenue.

Decentralized Katılım Ağustos 2018
176 Takip Edilen2.9K Takipçiler
Sabitlenmiş Tweet
PhishFort
PhishFort@PhishFort·
Couldn’t agree more. They don’t just target users — they target trust. That’s why we teamed up with the @1inch crew to break down how these scams actually play out in the wild, and what stops them. If you’re in DeFi, this one’s worth your time 👇 phishfort.com/how-to-protect…
1inch@1inch

Ok, so we disagree on stuff sometimes. But here’s one thing to bring us all together. Scammers suck. So we’ve teamed up with our friends @Phishfort to create this complete guide to scam techniques, and how you can stay safe from them. 👇

English
0
1
2
280
PhishFort
PhishFort@PhishFort·
Takedowns are often treated as a process problem. In reality, they’re a jurisdiction problem. #ccTLDs don’t follow the same rules, timelines, or expectations. That’s why enforcement can feel predictable in some cases and stalled in others. If you’ve ever wondered why similar domains get very different outcomes, this is worth a read. Good piece by our specialist, Chad Los Schumacher, breaking it down. phishfort.com/nuance-takedow…
English
0
0
0
52
PhishFort retweetledi
NiceNIC
NiceNIC@NiceNIC_Global·
NiceNIC and PhishFort: A Strategic Partnership for Domain Security NiceNIC is glad to work alongside organizations such as @PhishFort, NetBeacon, and Netcraft to support a more transparent and accountable internet environment. nicenic.com/news/NiceNIC-a…
NiceNIC tweet media
English
1
1
1
134
PhishFort
PhishFort@PhishFort·
Not all malware tries to evade detection. Some just avoids attention. LNK files fall into that category. Simple, familiar, and often dismissed during triage. Which is why they tend to surface late: when the payload is already running and the investigation is underway. We looked at how these attacks unfold — and where the early signals usually get missed. Read the full article here: phishfort.com/lnk-files-malw…
English
0
0
0
42
PhishFort
PhishFort@PhishFort·
Browser extensions tend to sit outside most security conversations. They shouldn’t. They run with high privileges in the browser, access sensitive data, and often sit outside standard monitoring workflows. That gap makes them an effective vector for phishing and data exfiltration. We broke down how this is being used in the wild. phishfort.com/browser-extens…
English
0
0
0
47
PhishFort
PhishFort@PhishFort·
In 2026, “phishing kits” covers a surprisingly wide range of tooling. Some impersonate brands dynamically. Some bypass MFA. Some evade crawlers. Polyglot phishing kits do all three — showing phishing pages to victims while serving harmless content to investigators. We broke one down 👇 phishfort.com/phishing-kits-…
English
0
0
1
58
PhishFort
PhishFort@PhishFort·
@1inch We've got your back, @1inch. 🫡 We are proud to be the engine behind the takedowns that keep your users safe!
English
0
0
0
8
1inch
1inch@1inch·
Our friends @phishfort help us find and take down scammers who impersonate 1inch. They’re leading experts in the methods scammers use to steal your funds. So we got together to produce your complete guide to staying safe in DeFi: blog.1inch.com/defi-security
English
2
1
9
2.6K
1inch
1inch@1inch·
What keeps you awake at night? We surveyed 10,000 DeFi users last year. Most listed security as their major concern. And what keeps you safer than anything else? Up-to-date knowledge. Consistent process. So we’ve teamed up with our partners @phishfort @zeroshadow_io and @savantchat to brief you on the cutting edge of DeFi security - and the practices they recommend to keep you safe. What’s first? 👇
English
7
6
29
32.1K
PhishFort
PhishFort@PhishFort·
Elite swaps deserve elite protection. While @1inch optimizes your trades, we provide the real-time radar to keep the path clear. 🛡️⚡ We’re proud to reinforce that bedrock with Phishfort’s global threat intelligence. This partnership isn't just a logo on a blog; it’s a proactive shield for every signature you make. Arm your wallet with our joint guide: 👇🔗 phishfort.com/how-to-protect… #DeFi #Web3Security #1inch #Phishfort
1inch@1inch

What keeps you awake at night? We surveyed 10,000 DeFi users last year. Most listed security as their major concern. And what keeps you safer than anything else? Up-to-date knowledge. Consistent process. So we’ve teamed up with our partners @phishfort @zeroshadow_io and @savantchat to brief you on the cutting edge of DeFi security - and the practices they recommend to keep you safe. What’s first? 👇

English
0
0
3
113
PhishFort
PhishFort@PhishFort·
Tired of the endless "Takedown-Reappear" cycle? 🫠🕹️ If you’re just removing content, you're only putting a bandage on a permanent problem. 🩹 Join our expert Chad Los Schumacher to learn how to achieve permanent domain suspensions with a 99% success rate. We'll cover: - Why Takedowns Fail - Registrar vs. Hosting - Closing Policy Gaps Stop hitting the mole. Start disabling the machine. 🔨 🗓️ Feb 26 | AM EST 🔗 Register here: phishfort.com/stop-whack-a-m… #Phishing #CyberSecurity #Web3 #infosec
English
0
0
1
77
PhishFort
PhishFort@PhishFort·
Nothing says "Surprise!" like realizing your Supply Chain is a bunch of hackers dressed like a Greek army in a wooden horse 🐎 As our specialist @dubstard would say: "Check the cargo before you let the horse in". Read the fresh news here: phishfort.com/supply-chain-a… Follow PhishFort for more updates on emerging threats and stay one step ahead of the curve.🛡️
English
0
0
1
95
PhishFort
PhishFort@PhishFort·
Your most expensive meeting this year could start with a "professional" Zoom invite. 🫠 🎥 In Web3, we’ve learned to spot bad links, but we still lower our guard when there’s a face behind the screen. Scammers are now weaponizing that human trust. They use the courtesy of a video call as a smokescreen to deliver malicious payloads while you’re distracted by the conversation. Our specialist @dubstard just deconstructed the "Zoom Heist." Read the full breakdown:🔗 phishfort.com/social-enginee… And don't forget to follow @PhishFort to stay ahead of the curve. 🛡️ #Web3Security #Phishing #CyberSecurity #Zoom
English
0
2
4
140
PhishFort
PhishFort@PhishFort·
𝗮𝗽𝗽.𝘆𝗼𝘂𝗿𝗯𝗿𝗮𝗻𝗱.𝗰𝗼𝗺 or 𝗮𝗽𝗽-𝘆𝗼𝘂𝗿𝗯𝗿𝗮𝗻𝗱.𝗰𝗼𝗺 ? 🤔 Can you spot the difference? One is your official gateway. The other is a pixel-perfect clone designed to drain your users' wallets the second they click "Connect." As if Web3 wasn't complex enough, scammers are now weaponizing subdomains and hyphens to bypass your community's split-second judgment. Our specialist Julian Drangosch just deconstructed why relying on your users' eyesight is a losing security strategy. 🛡️ Stop the spoofing here: 🔗phishfort.com/what-is-domain…
English
0
0
1
49
PhishFort retweetledi
Sohom Mukherjee
Sohom Mukherjee@thesohom2·
@PhishFort man love seeing this. scary how advanced these phishing tactics are.
English
0
1
1
45
PhishFort
PhishFort@PhishFort·
As if getting drained once wasn’t enough, the creativity of Web3 scammers truly knows no bounds... 🫠 The exploit is now just the "opening act." A secondary industry of fake recovery specialists has emerged, stalking victims in their most vulnerable moments. Fake legal firms, forged on-chain forensic reports, and "guaranteed" results, all designed to steal whatever you have left. Julian Drangosch just deconstructed the 4 patterns of this fake recovery market. See how the "Recovery" trap is set so you are NOT their next victim: 🔗 phishfort.com/crypto-asset-r…
English
0
0
0
47
PhishFort
PhishFort@PhishFort·
Your profile is a perfect match!🚀 3 days on a technical challenge. A Zoom call with a CTO. Then: "Just run this local environment to verify your deployment." Stop. You just got pwned. 🚩 This is how these scams look. A targeted campaign designed to bypass even senior devs. Julian Drangosch just deconstructed these "Ghost Interviews." Don't let your hard work be the gateway to your own hack. Check the Blacklist: phishfort.com/list-of-fake-r…
English
0
0
0
65
PhishFort
PhishFort@PhishFort·
Taking a whole domain down is easy. Doing it right is not. When legitimate sites are compromised, blanket takedowns can hurt businesses while attackers move on. In this article, Chad Los Schumacher explains how targeted takedown strategies help remove malicious content without unnecessary collateral damage. A practical read for security teams handling real-world incidents. If your team handles takedowns at scale, this is for you!  🫵 🔗 bit.ly/45e2xy3
English
2
0
1
94