April 28, 2022, 1:20 a.m. | Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva

cs.CR updates on arXiv.org arxiv.org

Most research into anti-phishing defence assumes that the mal-actor is
attempting to harvest end-users' personally identifiable information or login
credentials and, hence, focuses on detecting phishing websites. The defences
for this type of attack are usually activated after the end-user clicks on a
link, at which point the link is checked. This is known as after-the-click
detection. However, more sophisticated phishing attacks (such as spear-phishing
and whaling) are rarely designed to get the end-user to visit a website.
Instead, they …

anti-phishing application detection email phishing review

Embedded VSOC Analyst

@ Sibylline Ltd | Australia, Australia

Cloud Security Platform Engineer

@ Google | London, UK; United Kingdom

Senior Associate Cybersecurity GRC - FedRAMP

@ Workday | USA, VA, McLean

Senior Incident Response Consultant, Mandiant, Google Cloud

@ Google | Mexico; Colombia

Cyber Software Engineering, Advisor

@ Peraton | Fort Gordon, GA, United States

Cloud Security Architect (Federal)

@ Moveworks | Remote, USA