Threat Intelligence Blog
Understanding Prometheus TDS
3 min read
Understanding Prometheus TDS
By PRODAFT Team on July 1, 2024

Introduction Prometheus TDS emerged in 2020 as a Traffic Distribution System service, providing a feature for filtering and the redirection of potential victims to phishing and malicious...

Read More
Spoofing vs Phishing: Do You Know The Difference?
6 min read
Spoofing vs Phishing: Do You Know The Difference?
By PRODAFT Team on April 4, 2024

Spoofing and phishing in cybersecurity are different from each other. Yet their attacks shake multiple industries, incurring a great loss of data and resources. Brand protection and...

Read More
Seeing Through the Fog: Detecting Malicious Sites and Fake Social Media
6 min read
Seeing Through the Fog: Detecting Malicious Sites and Fake Social Media
By PRODAFT Team on October 24, 2023

With social media users giving away more personal information online, sensitive data can now easily travel beyond the owner’s control and into the hands of threat actors. Thus, it’s no...

Read More
Understanding Social Engineering Techniques and Why They Are So Convincing
6 min read
Understanding Social Engineering Techniques and Why They Are So Convincing
By PRODAFT Team on October 24, 2023

In cybersecurity, "social engineering" might sound like a complicated technical concept. Still, it's quite simple: it's the art of manipulating people into disclosing and sharing...

Read More
Loading more posts
No more posts to load
1

Get latest articles directly in your inbox, stay up to date