Hook, Line, and Sinker: The Best Free Tools to Catch Phishing
Phishing has become a widespread threat that organizations and IT security teams face daily. As attackers continue to evolve in their techniques, it makes it more difficult for organizations to detect phishing.
SANS_C-Taylor_Hook,_Line_Sinker_The_Best_Free_Tools_to_Catch_Phishing (PDF, 0.48MB)
5 Dec 2024Related Content
Structural Vulnerability: Autodesk Revit Server WAN Exposure Versus Cost of Autodesk Construction Cloud
Research PaperAutodesk Revit Server, a critical collaboration tool in the architecture, engineering, and construction (AEC) industry, was designed to operate within trusted networks.
- 7 Nov 2025
Privacy Protections: Are Stronger Laws Changing What We Reveal?
Research PaperAs U.S. states enact privacy laws aimed at giving consumers more control over their personal data, little is known about whether privacy legislation influences individuals’ willingness to disclose their identity on public platforms.
- 26 Sep 2025
Forensic Investigation of Bluetooth-Based Credit Card Skimmers
Research PaperHidden Bluetooth Low Energy (BLE) credit skimmers are a growing threat to credit card fraud. Criminals can set up practical and inexpensive systems built on top of modules, such as the HM-19, to collect and transmit stolen data covertly across wireless channels.
- 3 Sep 2025
A Pebble In the Ocean: Maximizing Log Fidelity In Container Environments
Research PaperLog fidelity is crucial for Incident Response Teams to investigate and contain cyber incidents but...
- 17 Apr 2025
Unveiling the Dependency on Network Telemetry: Optimizing Lateral Movement Detection
Research PaperThis study investigates the dependency on network and endpoint telemetry for identifying lateral...
- 17 Jan 2025
Beyond Detection: Using Real Phishing Data to Gauge Security Training Program Success
Research PaperIdentification of phishing emails can be cumbersome, accomplished by rule-based filters, machine...
- 7 Jan 2025
Revolutionizing Enterprise Security: The Exciting Future of Passkeys Beyond Passwords
Research PaperAs digital threats grow increasingly sophisticated, traditional password-based authentication...
- 23 Dec 2024
- Rich Greene
Protecting the Poor: A Deep Dive into EBT Skimming and Solutions to Combat It
Research PaperElectronic Benefits Transfer (EBT) cards provide individuals receiving government assistance for...
- 23 Dec 2024
The Open-Source Trap: Unraveling Open-Source Threats in the Software Supply Chain
Research PaperThe risk to the software supply chain is increasingly clear, as breaches like SolarWinds, Equifax,...
- 5 Dec 2024
SANS 2024 State of ICS/OT Cybersecurity
Research PaperThis white paper, SANS Certified Instructor Jason Christopher explores the growing trends in cyber...
- 9 Oct 2024
- SANS Institute
Shining a Light on AI: Ensuring Vendor Transparency in Data Sourcing and Delivery
Research PaperAmidst the proliferation of AI solutions, the focus lies in evaluating transparency, undisclosed...
- 29 Jan 2024
Building a Resilient Offensive Security Strategy
Research PaperIn this white paper, SANS Certified Instructor Matt Bromiley explores the results of our survey that...
- 13 Oct 2023
- Matt Bromiley
Really, How Bad Do Routers Have It?
Research PaperIn recent years, the United States government has warned the public that state-sponsored cyber...
- 22 Feb 2023
Inoculating the Masses: Evaluating Cybersecurity Awareness Training
Research PaperLike a disease, cybercrime is spreading across the world. The sums of money lost to these criminals...
- 22 Sep 2022
Building an Intelligent, Automated Tiered Phishing System: Matching the Message Level to User Ability
Research PaperPhishing campaigns and the procedures to run them have remained unchanged since the dawn of the...
- 12 Jan 2022
Expired Domain Dumpster Diving
Research PaperEvery day 200,000 domains expire ("DomCop FAQ," n.d.), become available for purchase and possible...
- 1 Sep 2021
Information Security Starts with the Employees
Research PaperOrganizations continue to spend exorbitant budgets to combat the issue of insider threat with one...
- 8 Jul 2021
A Swipe and a Tap: Does Marketing Easier 2FA Increase Adoption?
Research PaperData breaches and Internet-enabled fraud remain a costly and troubling issue for businesses and home...
- 19 Nov 2018
Online Safety in a Foreign Language - Connecting with Teens
Research PaperThe inescapable dangers of our increasingly connected world are likely most threatening to our young...
- 16 Oct 2017
Complement a Vulnerability Management Program with PowerShell
Research PaperA vulnerability management program is a critical task that all organizations should be running. Part...
- 10 Aug 2017
