A directive known as NIS2 was enacted in the European Union (EU) in late 2022. It deals particularly with European critical infrastructures, enlarging their scope substantially from an …
The mitigation action against a malicious website may differ greatly depending on how that site is hosted. If it is hosted under a private apex domain, where all its subdomains and …
N Begou, J Vinoy, A Duda… - 2023 IEEE Conference …, 2023 - ieeexplore.ieee.org
This paper explores the possibility of using Chat-GPT to develop advanced phishing attacks and automate their large-scale deployment. We make ChatGPT generate the following parts …
Ethereum Name Service (ENS) domains allow users to map human-readable names (such as gold. eth) to their cryptocurrency addresses, simplifying cryptocurrency transactions. Like …
Phishing is one of the most common cyberattacks these days. Attackers constantly look for new techniques to make their campaigns more lucrative by extending the lifespan of …
Internet Web and cloud services are routinely abused by malware, but the breadth of this abuse has not been thoroughly investigated. In this work, we quantitatively investigate this …
C Opara, Y Chen, B Wei - Expert Systems with Applications, 2024 - Elsevier
Phishing websites distribute unsolicited content and are frequently used to commit email and internet fraud. Detecting them before any user information is submitted is critical …
GCM Moura, T Daniels, M Bosteels, S Castro… - Proceedings of the …, 2024 - dl.acm.org
Phishing on the web is a model of social engineering and an attack vector for getting access to sensitive and financial data of individuals and corporations. Phishing has been identified …
A safe and secure Domain Name System (DNS) is of paramount importance for the digital economy and society. Malicious activities on the DNS, generally referred to as" DNS abuse" …