Viewing Phish with a Payload using PhishMe Intelligence and Maltego

BY MIKE SAURBAUGH AND GEOFF SINGER

Visualize Phishing Relationships with PhishMe Intelligence™ and Maltego

Fishing (without the “P”) is not a lot of fun when you just drop a line in the water and hope for the best. When fishermen want to see where the fish are, they look to the fish finder on the bridge to “look underwater” to find schools of fish. Similarly, when an analyst is looking to “catch” a phishing campaign, correlating the attacker’s campaigns and their payloads can benefit by being able to visually graph and link phishing threats. PhishMe Intelligence combined with Maltego can deliver the “phish finder” that an analyst needs.

PhishMe Named a Leader in the 2017 Gartner Magic Quadrant for Security Awareness Computer-Based Training

Company recognized as a Leader for second consecutive year and positioned highest in ability to execute 

LEESBURG, VA. – October 27, 2017 – Today PhishMe®, the leading provider of human phishing defense solutions, announced it was named a leader in Gartner’s October 2017 Magic Quadrant for Security Awareness Computer-Based Training. PhishMe has been recognized as a leader for two consecutive years and is positioned highest in ability to execute.

PhishMe Recognized as a 2017 Fastest Growing Company by Washington Business Journal

Company is one of Washington D.C.’s fastest growing companies for second consecutive year

LEESBURG, VA. – October 26, 2017 – Today PhishMe®, the leading provider of human phishing defense solutions, announced that it has been recognized as one of the 50 Fastest Growing Companies by Washington Business Journal (WBJ) for the second consecutive year. PhishMe moved up in the rankings from #21 in 2016 to #11 this year. The company was also in the top five companies that received the greatest percentage (288%) of employee growth between 2014 and 2016.

Locky or TrickBot? Depends Where You Are. Malicious Payload Delivery Tailored by Geographic Location

BY NEERA DESAI AND VICTOR CORNELL

It is not uncommon for threat actors to deploy malicious payloads from multiple malware families during a single phishing campaign. These malware tools may include ransomware, a financial crimes trojan, or other botnet malware. However, it is not as common for those attackers to deploy different malware tools based upon the geographic location of their victim.