mailchi.mp
Open in
urlscan Pro
125.56.150.85
Public Scan
URL:
https://mailchi.mp/dbd7fd85d809/stalkphish-apr2022?e=a903ad2b6b
Submission: On April 22 via api from JP — Scanned from JP
Submission: On April 22 via api from JP — Scanned from JP
Form analysis
0 forms found in the DOMText Content
Campaign URL Copy * Twitter 0 tweets * Subscribe * Past Issues * RSS * Translate * English * العربية * Afrikaans * беларуская мова * български * català * 中文(简体) * 中文(繁體) * Hrvatski * Česky * Dansk * eesti keel * Nederlands * Suomi * Français * Deutsch * Ελληνική * हिन्दी * Magyar * Gaeilge * Indonesia * íslenska * Italiano * 日本語 * ភាសាខ្មែរ * 한국어 * македонски јазик * بهاس ملايو * Malti * Norsk * Polski * Português * Português - Portugal * Română * Русский * Español * Kiswahili * Svenska * עברית * Lietuvių * latviešu * slovenčina * slovenščina * српски * தமிழ் * ภาษาไทย * Türkçe * Filipino * украї́нська * Tiếng Việt Some news about StalkPhish, our blog, our apps... enjoy :) View this email in your browser SOME NEWS FROM STALKPHISH - APRIL 2022 Let us come back to you with the latest news on StalkPhish’s projects, we still working hard on several Open Source Software, our SaaS platform StalkPhish.io or sharing knowledge through our blog. About our phishing relatives data available through our REST API platform StalkPhish.io, we are now more than 150 people registered on the application. That’s supa-great!!! Don't hesitate to come back to us if you encounter any problem of use, if you need help or for any request of evolution or improvement. You can contact us by email, or on Keybase.io Last month we developed an analyzer for the Intel Owl project. You just have to declare your Stalkphish.io key in the configuration file then your search will be enriched by Stalkphish.io data. We wrote a blog post about the use of this new analyzer: [Threat intelligence] Using StalkPhish.io with Intel Owl to speed up threat analysis Continuing sharing knowledge, we published the technical analysis of a phishing kit targeting M&T bank and its customers last month. We analyzed this kit because it presents a new way to use Telegram without trigger any Telegram usage detection. We invite you to regularly visit this blog where we share knowledge about phishing, scam, code tricks, TTPs en threat intelligence about the phishing and brand impersonation threat. Don’t hesitate to follow our searches and news on Twitter,LinkedIn, you can join us on Keybase.io too! Copyright (C) 2022 StalkPhish. All rights reserved. , or because you’re a stalkphish.io user. Want to change how you receive these emails? You can update your preferences or unsubscribe