Knowledge
What is phishing?
A plain-English but expert-level explanation of phishing, why it works, and how defenders should read phishing data.
The phishing attack chain
How phishing moves from preparation to delivery, capture, monetization and reuse.
Phishing attack kits
How phishing kits work, what they leak, and why kit intelligence is a high-value OSINT layer.
AiTM and reverse-proxy phishing
A careful overview of adversary-in-the-middle phishing and the indicators defenders can track safely.
Smishing in Belgium
How Belgian SMS phishing uses parcel, identity, tax, bank and support narratives.
Malicious ads and search abuse
Why phishing increasingly competes for visibility through sponsored results, social ads and fake support pages.
Fake investment platforms
How cloned firms, fake trading platforms and recovery-room scams overlap with phishing intelligence.
Mule routes: IBANs, phones and wallets
Why payment and contact routes are central to phishing intelligence.
Certificate Transparency for phishing discovery
How CT logs help detect brand impersonation and pre-deployment infrastructure.
URLScan, OSINT and phishing evidence
How submitted URLs, screenshots, DOM hashes and redirect chains support phishing investigations.
The phishing knowledge graph
Why phishing intelligence becomes more powerful when indicators are connected into a graph.
The societal impact of phishing
How phishing harms citizens, institutions, businesses and public trust.
Malware and credential theft
Where phishing overlaps with credential exposure, stealers, malicious attachments and account takeover.
Phishing evidence and takedown
How evidence, provenance and human approval turn intelligence into safe action.
Phishing OSINT research
How open-source phishing research becomes operational intelligence for public-sector and CERT teams.
Belgium phishing landscape
A Belgium-first view of phishing, smishing, fake platforms, mule routes and public-sector impersonation.
Active OSINT collection for phishing
How authorized active OSINT expands phishing intelligence beyond commodity feeds.
Phishing kit weakness intelligence
How kit reuse, exposed panels, debug artifacts and webhook patterns support CERT-safe investigations.
Campaign DNA and attacker infrastructure
How infrastructure reuse, timing, language, kits, certificates and mule routes reveal campaign structure.
CERT handoff and evidence packs
How phishing intelligence becomes a defensible package for CERT, regulator, abuse-desk or police workflows.
Solutions
Phishing intelligence for public sector and national cyber teams
Country-level phishing OSINT, evidence, campaigns, kit intelligence and exports for public cyber responsibility.
Phishing and fraud intelligence for banks and payments
Brand attacks, fake investment platforms, mule routes and evidence-ready phishing data for financial institutions.
Smishing intelligence for telecom and mobile abuse teams
Sender IDs, shortlinks, callback numbers, carrier timing and Belgian lure families.
Phishing intelligence for logistics and postal brands
Parcel-lure monitoring, fake tracking flows, SMS links, payment pages and brand abuse.
Brand impersonation and phishing monitoring
Lookalikes, ads, fake apps, CT discovery, public abuse surfaces and evidence-backed action.
Phishing OSINT for MSSPs, SOCs and MDR teams
Client-specific phishing data, export profiles, source quality and campaign insight.
Phishing OSINT for CERT and CSIRT teams
Country-level phishing, smishing, active OSINT, kit intelligence, evidence and export workflows for national and sector response teams.
Phishing OSINT for banks and payment providers
Fresh domains, fake support routes, mule routes, fake investment platforms and graph-backed evidence for financial fraud teams.
Platform
OSINT fusion for phishing and fraud
How PhishNet fuses open sources, active OSINT, evidence and exports into one operating picture.
PhishNet knowledge graph
Entities, relationships and evidence links for phishing intelligence.
Authorized active OSINT operations
Telegram/forum, SMS/email trap, honeypot, paste/code and public chatter intelligence under authorization.
Kit intelligence and weakness discovery
Phishing kit fingerprints, weaknesses, safe CERT actions and inferred operator clusters.
Evidence workbench
Archive, preserve, review and export phishing evidence.
Data API and exports
Feed confirmed and reviewable phishing intelligence into existing tooling.
Phishing OSINT graph platform
A graph-first operating model for phishing, smishing, mule routes, kits, campaigns, sources, evidence and exports.
Evidence and takedown workflows
Turn phishing OSINT into preserved evidence, analyst decisions, abuse-desk exports and CERT handoff packs.