Link Shield Blog

Security Blog

Case studies and technical breakdowns on phishing kits, malicous domains, report abuse, redirects, and evasive link infrastructure.

SecurityCase studiesTechnical breakdowns

Start with the URL

A close review of the phishing URL `gixon.sbs/_wildcard_.gixon.sbs/views/`, including the brand mismatch, wildcard clues, credential-harvest UX, and infrastructure patterns that make it dangerous.

Tim Leland
March 21, 2026
6 min read

Phishing Kit Domain Churn

Wildcard routing and fast domain churn make phishing infrastructure more disposable, more flexible, and harder to pin to a single hostname. Here is what defenders should log when they see it.

Tim Leland
March 21, 2026
3 min read

Redirect Chain Analysis

Static blocklists usually score the first URL they see. Attackers know that. Redirect-chain analysis is what reveals the real destination, the evasive hops, and the evidence hidden in transit.

Tim Leland
March 20, 2026
3 min read

Competitor Spam Reports

Bad actors do not just abuse links. They also abuse the systems meant to report them. Here is how spam-report floods get manufactured and what defenders should score instead of raw report volume.

Tim Leland
March 19, 2026
5 min read