Patching the Human: Help Them Remember Their Security TrainingTags:phishingideasCategories:tech 4 minute read
Identifying Phishing Attack Vectors Using dnstwist and SplunkTags:osintsplunkphishingprojectsCategories:tech 7 minute read