PhishingHunters Archives - PhishingHunters
-1
archive,category,category-phishinghunters,category-117,theme-bridge,bridge-core-3.0.2,woocommerce-no-js,qodef-qi--no-touch,qi-addons-for-elementor-1.5.3,qode-page-transition-enabled,ajax_fade,page_not_loaded,,qode-title-hidden,columns-4,qode-child-theme-ver-1.0.0,qode-theme-ver-28.8,qode-theme-bridge,wpb-js-composer js-comp-ver-6.9.0,vc_responsive,elementor-default,elementor-kit-16935

When we 'bite' on a phishing site and try to log in to what we believe to be the legitimate site, our credentials go into the cybercriminal's database. What happens next? The reality is that there is a great deal of specialization and there are different...

Nowadays it is difficult to find someone who has never heard of phishing, it is even more likely that you have seen different cases yourself or have experienced it in the first person. We could spend hours talking about different types of phishing: some are very...

The previous Extreme Gradient Boosting blog post described a study by PhishingHunters comparing different predictive analytics ranking models, which classified different credit card transactions into fraudulent and non-fraudulent transactions. The goal was to determine which algorithm had the highest performance. The Extreme Gradient Boosting ranking...

One of the sectors most affected by fraud is that of insurance companies and, without doubt, the main products that have become targets of cybercrime are car insurance, as more than 63% of fraud cases are focused on them. Every year, large amounts of money are...

Loading new posts...
No more posts