In light of COVID-19 precaution measures, we remind that all ImmuniWeb products can be easily configured and safely paid online without any human contact or paperwork.

Total Tests:
Stay in Touch

Weekly newsletter on AI, Application Security & Cybercrime

Your data will stay confidential Private and Confidential

High-Tech Bridge enhances discovery capacities of its phishing detection service

September 19, 2017

The free service provides a comprehensive overview of malicious, phishing, typosquatted and cybersquatted domains and websites that usurp your brand or identity.

Last week, the government of Singapore released a publication named “Singapore Cyber Landscape”, which provides key cyber threats and incidents in Singapore. Ransomware, phishing and website defacements are among the key threats identified by the research.

According to FBI, phishing scams cost American businesses half a billion USD a year. Meanwhile, phishing attacks persistently dominate the UK cybercrime landscape.

High-Tech Bridge is pleased to announce some major enhancements of its free online service to detect cybersquatting, typosquatting and phishing:

  • Proactive monitoring of all newly-registered TLDs for further analysis;
  • Major reinforcement of its OSINT sources with private sources of data (including honeypots);
  • History of deleted domains implicated in potentially illicit or fraudulent activities;
  • Secure view of a malicious website via a safe screenshotting feature.

The free service enables anyone to type in a domain name and get a list of websites and domains that may be used in identity theft, spear phishing, ransomware and malware distribution campaigns under the brand or identity of the victim.

Ilia Kolochenko, CEO of High-Tech Bridge, says: “Due to the increasing complexity and sophistication of cyber-attacks, fraudulent domains and web resources implicated in malware distribution campaigns and spear-phishing attacks become very difficult to detect. This is why, at High-Tech Bridge, we vigilantly follow new attack vectors and deception techniques leveraged by the cybercriminals and continuously improve our detection algorithms. Moreover, we are expanding our cooperation with cybersecurity industry to get as many reliable sources of data as possible. More exciting features are coming soon, please stay tuned.

User Comments
Add Comment

Ask a Question