Direct answer
Who uses Public sector phishing intelligence? Teams responsible for fraud loss, public protection, customer security, abuse response or sector coordination.
Problem
Public services are impersonated through tax, identity, fines, benefits, health and police narratives where citizens assume legitimacy.
PhishNet unique data
PhishNet compares official baselines with lookalikes, CT evidence, language cues, source overlap, public warnings and support-route spoofing.
Public-safe proof module
Public proof can show redacted sector themes, source overlap, confirmation state and country trend snippets from cached snapshots.
Integration path
Exports can feed SOC, MISP, SIEM, abuse, takedown and fraud workflows with provenance, confidence, liveness and evidence/detail links.
Conversion path
CTA: request a sector sample dataset, evidence pack example, or briefing.
How PhishNet uses this
Inside PhishNet this topic is treated as operational graph context: observations are linked to sources, evidence, Belgian relevance, confirmation state, liveness, campaigns and exports. Public pages explain the method; authenticated users can pivot into the full platform workflow when a signal needs investigation or handoff.
Selected sources and research
These pages combine PhishNet platform knowledge with public research, official Belgian sources and open OSINT documentation.
Common questions
Who uses Public sector phishing intelligence?
Teams responsible for fraud loss, public protection, customer security, abuse response or sector coordination.
What makes the feed operational?
Evidence readiness, source provenance, graph relationships, confidence states and export formats are present on each row.