Korean Data Intelligence Trailblazer S2W Joins Membership of APWG
Company aims to expand resources to counter cybercrime and provide APWG with another vital data source for monitoring of scams, fraud and phishing
Company aims to expand resources to counter cybercrime and provide APWG with another vital data source for monitoring of scams, fraud and phishing
Following up on the June 2021 report of cyber investigators and anti-abuse service providers on the ongoing impacts of ICANN’s implementation of the EU GDPR, the Temporary Specification for gTLD Registration Data (Temporary Specification, adopted...
For 2021 APWG’s members will once again come together to bridge the gaps between cybersecurity operations, research and consumer messaging with our fifteenth Symposium on Electronic Crime Research (eCrime 2021).
Goal of the 1st Global Online Scam Summit (GOSS) is to let Consumer Protection Agencies, Law Enforcement Bureaus, Governments, NGOs and Commercial Organizations work together to fight online fraud more effectively on a global scale...
Group-IB, a global threat hunting and intelligence company headquartered in Singapore, has entered into a partnership with Anti-Phishing Working Group (APWG), an international coalition unifying the global response to cybercrime. As an APWG member, Group-IB...
Interisle Consulting Group has published a new research report, Phishing Landscape 2020: A Study of the Scope and Distribution of Phishing.
The research papers to be published in conjunction with the Virtual 2020 Symposium on Electronic Crime Research have been selected. Register and join the event to be hosted November 16 – 19, 2020 to see...
Due to their ubiquity in modern web browsers, anti- phishing blacklists are a key defense against large-scale phishing attacks. However, sophistication in phishing websites—such as evasion techniques that seek to defeat these blacklists—continues to grow.
Phishing attacks have reached record volumes in recent years. Simultaneously, modern phishing websites are grow- ing in sophistication by employing diverse cloaking techniques to avoid detection by security infrastructure.