Can We Move Past Blocklists to Automated Takedowns?

In the struggle to prevent phishing, cyber defenders use URL blocklists. URL blocklists are ever-changing and difficult to keep current. Attackers make use of automation and other methods to bypass their effectiveness. Rather than everyone struggling to keep their ever-changing blocklists accurate...
By Susan Ramsey
October 6, 2021

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg