Knowledge centre

Phishing knowledge, OSINT graph intelligence, and buyer guides.

A centre for phishing knowledge: expert explainers, public research, daily dashboard context and platform capability pages built around the PhishNet knowledge graph.

Knowledge

Knowledge

What is phishing?

A plain-English but expert-level explanation of phishing, why it works, and how defenders should read phishing data.

Knowledge

The phishing attack chain

How phishing moves from preparation to delivery, capture, monetization and reuse.

Knowledge

Phishing attack kits

How phishing kits work, what they leak, and why kit intelligence is a high-value OSINT layer.

Knowledge

AiTM and reverse-proxy phishing

A careful overview of adversary-in-the-middle phishing and the indicators defenders can track safely.

Knowledge

Smishing in Belgium

How Belgian SMS phishing uses parcel, identity, tax, bank and support narratives.

Knowledge

Malicious ads and search abuse

Why phishing increasingly competes for visibility through sponsored results, social ads and fake support pages.

Knowledge

Fake investment platforms

How cloned firms, fake trading platforms and recovery-room scams overlap with phishing intelligence.

Knowledge

Mule routes: IBANs, phones and wallets

Why payment and contact routes are central to phishing intelligence.

Knowledge

Certificate Transparency for phishing discovery

How CT logs help detect brand impersonation and pre-deployment infrastructure.

Knowledge

URLScan, OSINT and phishing evidence

How submitted URLs, screenshots, DOM hashes and redirect chains support phishing investigations.

Knowledge

The phishing knowledge graph

Why phishing intelligence becomes more powerful when indicators are connected into a graph.

Knowledge

The societal impact of phishing

How phishing harms citizens, institutions, businesses and public trust.

Knowledge

Malware and credential theft

Where phishing overlaps with credential exposure, stealers, malicious attachments and account takeover.

Knowledge

Phishing evidence and takedown

How evidence, provenance and human approval turn intelligence into safe action.

Knowledge

Phishing OSINT research

How open-source phishing research becomes operational intelligence for public-sector and CERT teams.

Knowledge

Belgium phishing landscape

A Belgium-first view of phishing, smishing, fake platforms, mule routes and public-sector impersonation.

Knowledge

Active OSINT collection for phishing

How authorized active OSINT expands phishing intelligence beyond commodity feeds.

Knowledge

Phishing kit weakness intelligence

How kit reuse, exposed panels, debug artifacts and webhook patterns support CERT-safe investigations.

Knowledge

Campaign DNA and attacker infrastructure

How infrastructure reuse, timing, language, kits, certificates and mule routes reveal campaign structure.

Knowledge

CERT handoff and evidence packs

How phishing intelligence becomes a defensible package for CERT, regulator, abuse-desk or police workflows.

Knowledge

The psychology of phishing attacks

How urgency, authority, trust transfer, loss aversion and local context make phishing effective.

Knowledge

The economics of phishing

How kits, ads, hosting, credentials, mule routes and fake platforms form a repeatable fraud market.

Knowledge

Phishing kit families and campaign DNA

How kit fingerprints, AiTM markers, panel paths and safe weakness intelligence connect campaigns.

Knowledge

Belgium versus Europe: phishing patterns and country differences

How Belgian phishing differs from neighbouring markets in language, brands, TLDs, lures and payment routes.

Audiences

Audiences

For journalists covering phishing and online fraud

Journalists need defensible context, safe examples, charts, quotes and methodology without publishing live victim-harm artifacts. PhishNet answers it with public-safe data, research context, graph evidence and a direct route into operational access.

Audiences

For phishing and fraud researchers

Researchers need reproducible snapshots, source provenance, bias notes, confirmation states and datasets that can be cited. PhishNet answers it with public-safe data, research context, graph evidence and a direct route into operational access.

Audiences

For CERT and CSIRT teams

CERT and CSIRT teams need early warning, evidence readiness, MISP/STIX sharing, takedown packs and national or sector context. PhishNet answers it with public-safe data, research context, graph evidence and a direct route into operational access.

Audiences

For cyber analysts and SOC teams

Analysts need to pivot from one IOC into campaign, source, evidence, liveness, kit and export context fast. PhishNet answers it with public-safe data, research context, graph evidence and a direct route into operational access.

Audiences

For banks and fraud teams

Banks need brand impersonation, fake investment platforms, mule routes, payment references and evidence that can support response. PhishNet answers it with public-safe data, research context, graph evidence and a direct route into operational access.

Audiences

For telecom and smishing teams

Telecom teams need sender IDs, callback numbers, shortlinks, carrier timing and country-language lure patterns. PhishNet answers it with public-safe data, research context, graph evidence and a direct route into operational access.

Audiences

For MSSPs, MDRs and SOC providers

Service providers need repeatable client-ready feeds, source quality, export health, false-positive control and evidence links. PhishNet answers it with public-safe data, research context, graph evidence and a direct route into operational access.

Audiences

For abuse desks and infrastructure providers

Abuse teams need prioritized evidence, hosting/ASN recurrence, liveness, takedown context and repeat infrastructure patterns. PhishNet answers it with public-safe data, research context, graph evidence and a direct route into operational access.

Data products

Reports

Solutions

Solutions

Phishing intelligence for public sector and national cyber teams

Country-level phishing OSINT, evidence, campaigns, kit intelligence and exports for public cyber responsibility.

Solutions

Phishing and fraud intelligence for banks and payments

Brand attacks, fake investment platforms, mule routes and evidence-ready phishing data for financial institutions.

Solutions

Smishing intelligence for telecom and mobile abuse teams

Sender IDs, shortlinks, callback numbers, carrier timing and Belgian lure families.

Solutions

Phishing intelligence for logistics and postal brands

Parcel-lure monitoring, fake tracking flows, SMS links, payment pages and brand abuse.

Solutions

Brand impersonation and phishing monitoring

Lookalikes, ads, fake apps, CT discovery, public abuse surfaces and evidence-backed action.

Solutions

Phishing OSINT for MSSPs, SOCs and MDR teams

Client-specific phishing data, export profiles, source quality and campaign insight.

Solutions

Phishing OSINT for CERT and CSIRT teams

Country-level phishing, smishing, active OSINT, kit intelligence, evidence and export workflows for national and sector response teams.

Solutions

Phishing OSINT for banks and payment providers

Fresh domains, fake support routes, mule routes, fake investment platforms and graph-backed evidence for financial fraud teams.

Solutions

Phishing OSINT research platform for universities and cyber labs

Sanitized public observations, reproducible snapshots and authenticated graph-backed datasets for phishing, smishing, mule-route, kit and campaign research.

Solutions

Phishing intelligence feed for CERT and CSIRT teams

A country-scoped phishing feed with evidence, source quality, confirmation state, liveness and MISP/STIX-ready exports.

Solutions

MISP and STIX phishing feed for public-sector teams

MISP/STIX-compatible phishing intelligence with provenance, confidence, liveness and evidence references.

Solutions

Fake investment platform monitoring

Detect fake trading platforms, recovery-room scams, cloned regulated firms, celebrity-ad abuse and payment-route signals.

Solutions

Belgian smishing intelligence for telecom teams

Sender IDs, shortlinks, callback numbers, carrier timing, lure families and evidence-ready SMS phishing exports.

Solutions

Phishing OSINT API for MSSPs and SOC teams

Client-scoped phishing OSINT, evidence, source quality and export-ready datasets for service providers.

Solutions

Phishing dataset access for research institutions

Reproducible public snapshots and authenticated graph-backed datasets for universities, labs and policy institutes.

Solutions

For MISP communities

MISP-ready phishing intelligence with explicit confidence, provenance, liveness and evidence links.

Solutions

For universities and applied cyber labs

Public-safe phishing research, reproducible snapshots and authenticated data partnerships.

Solutions

For cyber insurers

Phishing pressure, evidence readiness, brand exposure and sector benchmarks for underwriting and claims context.

Solutions

For abuse desks and hosting providers

Evidence-ready phishing, source provenance, graph context and takedown-ready handoff packages.

Solutions

Belgium phishing intelligence

Country-scoped phishing, smishing, fake-platform and evidence intelligence for Belgium with source provenance and export paths.

Solutions

Netherlands phishing intelligence

Country-scoped phishing, smishing, fake-platform and evidence intelligence for Netherlands with source provenance and export paths.

Solutions

Luxembourg phishing intelligence

Country-scoped phishing, smishing, fake-platform and evidence intelligence for Luxembourg with source provenance and export paths.

Solutions

France phishing intelligence

Country-scoped phishing, smishing, fake-platform and evidence intelligence for France with source provenance and export paths.

Solutions

Germany phishing intelligence

Country-scoped phishing, smishing, fake-platform and evidence intelligence for Germany with source provenance and export paths.

Solutions

UK phishing intelligence

Country-scoped phishing, smishing, fake-platform and evidence intelligence for UK with source provenance and export paths.

Solutions

EU phishing intelligence

Country-scoped phishing, smishing, fake-platform and evidence intelligence for EU with source provenance and export paths.

Solutions

Banking phishing intelligence

Sector-specific phishing, impersonation, evidence and export intelligence for banking teams.

Solutions

Telecom phishing intelligence

Sector-specific phishing, impersonation, evidence and export intelligence for telecom teams.

Solutions

Postal logistics phishing intelligence

Sector-specific phishing, impersonation, evidence and export intelligence for postal logistics teams.

Solutions

Public sector phishing intelligence

Sector-specific phishing, impersonation, evidence and export intelligence for public sector teams.

Solutions

Insurance phishing intelligence

Sector-specific phishing, impersonation, evidence and export intelligence for insurance teams.

Solutions

Marketplaces phishing intelligence

Sector-specific phishing, impersonation, evidence and export intelligence for marketplaces teams.

Platform

Platform

OSINT fusion for phishing and fraud

How PhishNet fuses open sources, active OSINT, evidence, graph relationships and exports into one operating picture.

Platform

PhishNet knowledge graph

How domains, URLs, brands, kits, phones, IBANs, evidence, sources and cases become connected phishing intelligence.

Platform

Authorized active OSINT operations

Telegram/forum, SMS/email trap, honeypot, paste/code and public chatter intelligence under authorization.

Platform

Kit intelligence and weakness discovery

Phishing kit fingerprints, safe weakness summaries, campaign DNA and CERT handoff context.

Platform

Evidence workbench

Archive, preserve, review and export phishing evidence.

Platform

Data API and exports

Feed confirmed and reviewable phishing intelligence into existing tooling.

Platform

Cyber insurance risk intelligence

Outside-in posture, loss-event monitoring, evidence observations and portfolio accumulation datasets for underwriting and claims context.

Platform

Phishing OSINT graph platform

A graph-first operating model for phishing, smishing, mule routes, kits, campaigns, sources, evidence and exports.

Platform

Evidence and takedown workflows

Turn phishing OSINT into preserved evidence, analyst decisions, abuse-desk exports and CERT handoff packs.

Platform

How to ingest PhishNet into MISP

A public-safe guide to structuring PhishNet phishing intelligence for MISP sharing communities.

Platform

PhishNet STIX and TAXII schema

How PhishNet represents phishing observations, evidence, campaigns and confidence in STIX-style exports.

Platform

Belgian phishing OSINT dataset methodology

How PhishNet builds public-safe and authenticated phishing datasets with provenance, redaction and bias notes.

Platform

CERT handoff pack example

What an evidence-ready phishing handoff package should contain for CERT and abuse workflows.

Platform

Evidence readiness scoring guide

How PhishNet explains whether a phishing observation is ready for action, export, research or handoff.