mailchi.mp Open in urlscan Pro
125.56.150.85  Public Scan

URL: https://mailchi.mp/dbd7fd85d809/stalkphish-apr2022?e=a903ad2b6b
Submission: On April 22 via api from JP — Scanned from JP

Form analysis 0 forms found in the DOM

Text Content

Campaign URL Copy
 * Twitter 0 tweets

 * Subscribe
 * Past Issues
 * RSS
 * Translate
   * English
   * العربية
   * Afrikaans
   * беларуская мова
   * български
   * català
   * 中文(简体)
   * 中文(繁體)
   * Hrvatski
   * Česky
   * Dansk
   * eesti keel
   * Nederlands
   * Suomi
   * Français
   * Deutsch
   * Ελληνική
   * हिन्दी
   * Magyar
   * Gaeilge
   * Indonesia
   * íslenska
   * Italiano
   * 日本語
   * ភាសាខ្មែរ
   * 한국어
   * македонски јазик
   * بهاس ملايو
   * Malti
   * Norsk
   * Polski
   * Português
   * Português - Portugal
   * Română
   * Русский
   * Español
   * Kiswahili
   * Svenska
   * עברית
   * Lietuvių
   * latviešu
   * slovenčina
   * slovenščina
   * српски
   * தமிழ்
   * ภาษาไทย
   * Türkçe
   * Filipino
   * украї́нська
   * Tiếng Việt

Some news about StalkPhish, our blog, our apps... enjoy  :)

View this email in your browser


SOME NEWS FROM STALKPHISH - APRIL 2022



Let us come back to you with the latest news on StalkPhish’s projects, we still
working hard on several Open Source Software, our SaaS platform StalkPhish.io or
sharing knowledge through our blog.





About our phishing relatives data available through our REST API platform
StalkPhish.io, we are now more than 150 people registered on the application.
That’s supa-great!!!

Don't hesitate to come back to us if you encounter any problem of use, if you
need help or for any request of evolution or improvement. You can contact us by
email, or on Keybase.io





Last month we developed an analyzer for the Intel Owl project. You just have to
declare your Stalkphish.io key in the configuration file then your search will
be enriched by Stalkphish.io data.

We wrote a blog post about the use of this new analyzer: [Threat intelligence]
Using StalkPhish.io with Intel Owl to speed up threat analysis





Continuing sharing knowledge, we published the technical analysis of a phishing
kit targeting M&T bank and its customers last month. We analyzed this kit
because it presents a new way to use Telegram without trigger any Telegram usage
detection.

We invite you to regularly visit this blog where we share knowledge about
phishing, scam, code tricks, TTPs en threat intelligence about the phishing and
brand impersonation threat.

Don’t hesitate to follow our searches and news on Twitter,LinkedIn, you can join
us on Keybase.io too!





Copyright (C) 2022 StalkPhish. All rights reserved.
, or because you’re a stalkphish.io user.

Want to change how you receive these emails?
You can update your preferences or unsubscribe