• We know what information hackers have on you!
Twitter Linkedin-in Facebook-f Instagram
Cyberthint
  • Home
  • Platform
  • Pricing
  • Resources
  • Company
    • About Us
    • Terms of Use
    • Privacy Policy
    • Contact
FREE TRIAL
Cyberthint
Free Trial
  • Home
  • Platform
  • Pricing
  • Resources
  • Company
    • About Us
    • Terms of Use
    • Privacy Policy
    • Contact

Tag: phishing methods

Cyber Threats
11 April 2023

Use of Proxy Method in Phishing Attacks

A proxy phishing is a method of attack that aims to make you visit a malicious link through trusted/reputable websites.

For phishing attacks based on this proxy method, it is most commonly done by abusing the open redirect feature of services such as Google Translate and Bing.

LEARN MORE
Categories
  • CTI Fundamentals (1)
  • Cyber Threats (3)
  • Malware Analysis (1)
  • Threat Intelligence Reports (1)
  • Use Cases (7)
  • Vulnerabilities (2)
Recent Posts
  • Increase in the Theft of Credit Cards Using “Sniffer” in Recent
    5 May 2023
  • Use of Proxy Method in Phishing Attacks
    11 April 2023
  • What is BEC (Business E-mail Compromise) Attack and Prevention Methods
    10 April 2023
Tags
2022 cyberthint report account takeover bec attack bing phishing business email compromise business email compromise attack cc sniffer cti CVE-2023-23752 cybercrimes cyber intelligence cyber threat intelligence cyber threat intelligence platform dark web data breaches deep web fortios vulnerability fortiproxy vulnerability fraud google translate phishing hacker forums hacker platforms joomla joomla vulnerability malware analysis phishing attacks phishing detection phishing methods phishing monitoring phishing prevention proxy method phishing sniffing social engineering stealer logs stealing credit card stolen credentials threat feeds threat intelligence underground forums what is bec what is cti what is cyber threat intelligence whitesnake malware whitesnake malware analysis whitesnake stealer
Tweets by cyberthint
Solutions
  • Threat Intelligence
  • SecOps Intelligence
  • Vulnerability Intelligence & Management
  • Strategic Intelligence
  • Brand Intelligence & Protection
  • Incident Management
  • Cyber Daily
Use Case
  • Data Leak & Account Takeover Detection
  • Deep/Dark Web Monitoring
  • Targeted Phishing Detection
  • IoC Enrichment and Threat DB Integration
  • Stolen Credit Cards Detection
  • Cyberthint Using for Threat Hunters
  • Cyberthint Using for Vulnerability Intelligence
Resources
  • Blog
  • News From Us
  • Cyberthint vs. Competitor
  • Use Cases
  • Case Studies
  • Threat Intelligence Reports
  • CTI Fundamentals
  • Vulnerabilities
  • Technical FAQ
  • Managerial FAQ
Company
  • About Us
  • Partners
  • Terms of Use
  • Privacy Policy
  • Contact Us

Newsletter

Building No. 49 Ground Floor Office No. 1 D Ring Road Doha, Qatar

Our Address

info[at]cyberthint.io

Our Mailbox

+90216 4140314
+9744 4879762

Our Phones
Twitter Linkedin-in Facebook-f Instagram

Copyright © 2022 Cyberthint by Seccops. All Rights Reserved.