Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

W Li, S Manickam, SUA Laghari, YW Chong - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals
to unlawfully acquire sensitive user information, including passwords, account details, credit …

Canary in twitter mine: collecting phishing reports from experts and non-experts

H Nakano, D Chiba, T Koide, N Fukushi… - Proceedings of the 18th …, 2023 - dl.acm.org
The rise in phishing attacks via e-mail and short message service (SMS) has not slowed
down at all. The first thing we need to do to combat the ever-increasing number of phishing …

PhishLang: A lightweight, client-side phishing detection framework using MobileBERT for real-time, explainable threat mitigation

SS Roy, S Nilizadeh - arxiv preprint arxiv:2408.05667, 2024 - arxiv.org
In this paper, we introduce PhishLang, an open-source, lightweight language model
specifically designed for phishing website detection through contextual analysis of the …

Cybersecurity misinformation detection on social media: Case studies on phishing reports and zoom's threat

M Singhal, N Kumarswamy, S Kinhekar… - Proceedings of the …, 2023 - ojs.aaai.org
Prior work has extensively studied misinformation related to news, politics, and health,
however, misinformation can also be about technological topics. While less controversial …

Piracema: a Phishing snapshot database for building dataset features

JC Gomes de Barros, CM Revoredo da Silva… - Scientific Reports, 2022 - nature.com
Phishing is an attack characterized by attempted fraud against users. The attacker develops
a malicious page that is a trusted environment, inducing its victims to submit sensitive data …

Intellitweet: A multifaceted feature approach to detect malicious tweets

EE Dzeha, GV Jourdan - … Symposium on Foundations and Practice of …, 2023 - Springer
Twitter faces an ongoing issue with malicious tweets from deceptive accounts engaged in
phishing, scams, and spam, negatively impacting the overall Twitter user experience. In …

'Hey mum, I dropped my phone down the toilet': Investigating Hi Mum and Dad SMS Scams in the United Kingdom

S Agarwal, E Harvey, E Mariconti… - Usenix Security …, 2025 - dspace.networks.imdea.org
SMS fraud has surged in recent years. Detection techniques have improved along with the
fraud, necessitating harder-to-detect fraud techniques. We study one of these where …

Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter

H Nakano, D Chiba, T Koide, N Fukushi… - … on Information and …, 2024 - search.ieice.org
The increase in phishing attacks through email and short message service (SMS) has
shown no signs of deceleration. The first thing we need to do to combat the ever-increasing …

Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding

J Cui, H Kim, E Jang, D Yim, K Kim, Y Lee… - arxiv preprint arxiv …, 2024 - arxiv.org
Twitter is recognized as a crucial platform for the dissemination and gathering of Cyber
Threat Intelligence (CTI). Its capability to provide real-time, actionable intelligence makes it …

The IntelliTweet: Unveiling Malicious Activities in Tweets through a Multifaceted Feature Analysis

E Dzeha - 2024 - ruor.uottawa.ca
Social media platforms have seamlessly integrated into our daily communication, facilitating
information sharing, connections and engagement for both individuals and businesses …