Tricky Fake Crypto Apps on Google Play
Over 20 Fake Mobile Apps Are Phishing Crypto Wallet Users
A recent investigation by Cyble Research and Intelligence Labs (CRIL) uncovered more than 20 malicious Android applications on the Google Play...
Inside Darcula: The Phishing Kit That’s Fooling Everyone
When a rising Fraud-as-a-Service (FAAS) phishing kit makes it into mainstream media, it’s usually a sign that it has reached a scale and level of sophistication that should alarm cybersecurity professionals.The ABC recently reported on a phishing kit known as Darcula. In the...
Hidden in Plain Sight: 6 Ways Phishing Sites Avoid Detection
Hidden in Plain Sight: 6 Ways Phishing Sites Avoid Detection
Phishing websites have become far more sophisticated than the basic spoof pages we saw a few years ago. As security experts improve detection...
Phishing Site Takedown: What to Do When Registrars Ignore Your Complaint
Phishing Site Takedowns: How to Escalate When Registrars Ignore Abuse
Few things are more frustrating in cybersecurity than a domain registrar ignoring a clear case of DNS abuse. Whether it’s a phishing...
DNS Abuse vs. Content Abuse: Where Registrars Draw the Line
The rise of fake websites used in phishing attacks has prompted a closer examination of how domain name abuse is handled. One of the biggest challenges in enforcement is distinguishing between DNS abuse—where the domain system itself is weaponized—and content abuse, which...
Cheap Domains, Costly Threats: How Cybercriminals Exploit Bulk Registrations
Bulk Domain Registrations: How Criminals Exploit Cheap Domains
How Cybercriminals Exploit Cheap Bulk Registrations
The retail domain name...
DNS Abuse: Phishing Evidence Submission
The Domain Name System (DNS) is designed to connect to users and services effortlessly. However, this system is exploited by bad actors for malicious purposes, generally known as DNS Abuse. Understanding what constitutes DNS Abuse, specifically phishing, and knowing how to...
Facebook Ad Scams Back on National Radar
Facebook Ad Scams are back in the news... but they have always been here
Facebook Ads are back in the spotlight, with the Government ramping up attention after DeepFakes of the Prime Minister started...
ASD Report: Cyber Threat Landscape 2023–24
ASD's Cyber Threat Landscape 2023–24: Introduction
The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) is the Australian Government’s technical authority on cyber security....
Website Takedown Guide: Protecting Against Phishing & Fraud
Clone Website Takedown Guide: Protecting Against Web Phishing, Impersonation & Fraud
13 MillionMalicious domain names registered every...
Website Takedown Service | Take Down Fraudulent Websites
Website Takedown Service Trusted By Australia’s Most Notable Brands
Our phishing takedown service is trusted by Australia’s most notable brands because we deliver fast, reliable, and highly targeted solutions that protect their online presence...










