Category

Malicious

Technical breakdowns of suspicious and malicious URLs, infrastructure, and abuse patterns.

4 articles
Start with the URL

A close review of the phishing URL `gixon.sbs/_wildcard_.gixon.sbs/views/`, including the brand mismatch, wildcard clues, credential-harvest UX, and infrastructure patterns that make it dangerous.

Tim LelandMarch 21, 20266 min read
Phishing Kit Domain Churn

Wildcard routing and fast domain churn make phishing infrastructure more disposable, more flexible, and harder to pin to a single hostname. Here is what defenders should log when they see it.

Tim LelandMarch 21, 20263 min read
Redirect Chain Analysis

Static blocklists usually score the first URL they see. Attackers know that. Redirect-chain analysis is what reveals the real destination, the evasive hops, and the evidence hidden in transit.

Tim LelandMarch 20, 20263 min read
Competitor Spam Reports

Bad actors do not just abuse links. They also abuse the systems meant to report them. Here is how spam-report floods get manufactured and what defenders should score instead of raw report volume.

Tim LelandMarch 19, 20265 min read