PhishFort Blog

Our Research and Announcements

Stay informed with our latest blog posts.

Cybersecurity 4 min read

Open Source Supply Chain Attack: Why Developers Are the New Target

Open source supply chain attacks are targeting developers and maintainers to compromise downstream applications. Learn how these attacks work and how to protect your code.

Read more: Open Source Supply Chain Attack: Why Developers Are the New Target
Cybersecurity 7 min read

Crypto Asset Recovery: How to Identify Legitimate Companies vs. Scams

The rise of digital asset theft has birthed a secondary, equally predatory industry: the crypto asset recovery scam. Learn how to identify legitimate recovery companies and avoid falling victim twice.

Read more: Crypto Asset Recovery: How to Identify Legitimate Companies vs. Scams
Cybersecurity 2 min read

Social Engineering: The 'Can You Hear Me?' Trap Explained

In the high-stakes ecosystem of Web3 and venture capital, understanding social engineering is crucial as meeting requests become routine.

Read more: Social Engineering: The 'Can You Hear Me?' Trap Explained
Blog

More crypto posts

Cybersecurity 5 min read

The Nuance of Takedowns: The Challenge of the Compromised Site

Learn the effective domain takedown strategy for all abuse scenarios: from brand squatting to active phishing. Understand registrar reluctance, the role of domain age, and how to approach DNS abuse mitigation for new versus compromised sites.

Read more: The Nuance of Takedowns: The Challenge of the Compromised Site
Uncategorized 3 min read

5 Essential Strategies to Understand and Prevent Crypto Phishing Scams

Learn how Crypto Phishing Scams work through 5 essential strategies, including DEX attacks, wallet recovery scams, hardware wallet risks, Bitcoin Core phishing, and how to spot threats in Web3 environments.

Read more: 5 Essential Strategies to Understand and Prevent Crypto Phishing Scams