Phishing Attack

“Are Adversarial Phishing Webpages a Threat in Reality?” Understanding the Users’ Perception of Adversarial Webpages

Authors: Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang | Published: 2024-04-03
Phishing Attack
Detection Rate of Phishing Attacks
Phishing Detection

Lateral Phishing With Large Language Models: A Large Organization Comparative Study

Authors: Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad | Published: 2024-01-18 | Updated: 2025-04-15
Phishing Attack
Prompt Injection

Malla: Demystifying Real-world Large Language Model Integrated Malicious Services

Authors: Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang | Published: 2024-01-06 | Updated: 2024-08-19
Phishing Attack
Prompt Injection
Malicious Content Generation

Opening A Pandora’s Box: Things You Should Know in the Era of Custom GPTs

Authors: Guanhong Tao, Siyuan Cheng, Zhuo Zhang, Junmin Zhu, Guangyu Shen, Xiangyu Zhang | Published: 2023-12-31
Cybersecurity
Phishing Attack
Prompt Injection

Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models

Authors: Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein, Peter S. Park | Published: 2023-08-23 | Updated: 2023-11-30
Phishing
Phishing Attack
Prompt Injection

Spear Phishing With Large Language Models

Authors: Julian Hazell | Published: 2023-05-11 | Updated: 2023-12-22
Cyber Attack
Phishing Attack
Prompt Injection

Profiler: Profile-Based Model to Detect Phishing Emails

Authors: Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal | Published: 2022-08-18
Phishing Attack
Detection Rate of Phishing Attacks
Machine Learning Technology

TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection

Authors: Sijia Li, Gaopeng Gou, Chang Liu, Chengshang Hou, Zhenzhen Li, Gang Xiong | Published: 2022-04-28
Cybersecurity
Network Node Configuration
Phishing Attack

An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

Authors: Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti | Published: 2022-04-27
Cybersecurity
Phishing Attack
Attack Method

Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection

Authors: Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva | Published: 2022-04-27
Watermarking
Phishing Attack
Visual Similarity Detection