Knowledge centre

Phishing knowledge, OSINT graph intelligence, and buyer guides.

A centre for phishing knowledge: expert explainers, public research, daily dashboard context and platform capability pages built around the PhishNet knowledge graph.

Knowledge

Knowledge

What is phishing?

A plain-English but expert-level explanation of phishing, why it works, and how defenders should read phishing data.

Knowledge

The phishing attack chain

How phishing moves from preparation to delivery, capture, monetization and reuse.

Knowledge

Phishing attack kits

How phishing kits work, what they leak, and why kit intelligence is a high-value OSINT layer.

Knowledge

AiTM and reverse-proxy phishing

A careful overview of adversary-in-the-middle phishing and the indicators defenders can track safely.

Knowledge

Smishing in Belgium

How Belgian SMS phishing uses parcel, identity, tax, bank and support narratives.

Knowledge

Malicious ads and search abuse

Why phishing increasingly competes for visibility through sponsored results, social ads and fake support pages.

Knowledge

Fake investment platforms

How cloned firms, fake trading platforms and recovery-room scams overlap with phishing intelligence.

Knowledge

Mule routes: IBANs, phones and wallets

Why payment and contact routes are central to phishing intelligence.

Knowledge

Certificate Transparency for phishing discovery

How CT logs help detect brand impersonation and pre-deployment infrastructure.

Knowledge

URLScan, OSINT and phishing evidence

How submitted URLs, screenshots, DOM hashes and redirect chains support phishing investigations.

Knowledge

The phishing knowledge graph

Why phishing intelligence becomes more powerful when indicators are connected into a graph.

Knowledge

The societal impact of phishing

How phishing harms citizens, institutions, businesses and public trust.

Knowledge

Malware and credential theft

Where phishing overlaps with credential exposure, stealers, malicious attachments and account takeover.

Knowledge

Phishing evidence and takedown

How evidence, provenance and human approval turn intelligence into safe action.

Knowledge

Phishing OSINT research

How open-source phishing research becomes operational intelligence for public-sector and CERT teams.

Knowledge

Belgium phishing landscape

A Belgium-first view of phishing, smishing, fake platforms, mule routes and public-sector impersonation.

Knowledge

Active OSINT collection for phishing

How authorized active OSINT expands phishing intelligence beyond commodity feeds.

Knowledge

Phishing kit weakness intelligence

How kit reuse, exposed panels, debug artifacts and webhook patterns support CERT-safe investigations.

Knowledge

Campaign DNA and attacker infrastructure

How infrastructure reuse, timing, language, kits, certificates and mule routes reveal campaign structure.

Knowledge

CERT handoff and evidence packs

How phishing intelligence becomes a defensible package for CERT, regulator, abuse-desk or police workflows.

Solutions

Platform