Malicious URL

24th September 2020 | Cybrary Malicious URL


malicious URLs

A Malicious URL is a link created with the purpose of promoting scams, attacks, and fraud. By clicking on an infected URL, you may download malware or a trojan that can take control of your device, or you might be persuaded into providing personal information on a fake website such as your username and password. Malicious URLs are often seen embedded in phishing attacks, tricking users into clicking on the link(s). Hackers use techniques like “typosquatting” to make malicious URLs look legitimate. For example, the URL is r n icrosoft.com rather than microsoft.com can be used to trick users due to it looking legitimate at a glance.

Source: Gatefy

Additional Reading: Smishing, The New Phishing

Related Terms: Typosquatting, Phishing, Trojan Horse

What does this mean for a Business Owner or Employee?

Businesses should be doing all they can to reduce the likelihood of employees falling victim to malicious URLs or other cyber risks. CyberHoot recommends following these best practices to help your organization stay more secure:

Nothing you do will guarantee you cannot be compromised. However, doing these things proactively will act like the ounce of prevention Ben Franklin was fond of talking about with respect to Fire prevention.  It’s worth a pound of cure during a fire (or a breach).  Watch the video below for more details on these attacks.

To learn more about malicious URLs through typosquatting, watch this short video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

CyberHoot Newsletter – June 2025

CyberHoot Newsletter – June 2025

CyberHoot June Newsletter: Stay Informed, Stay Secure Welcome to the June edition of CyberHoot’s newsletter,...

Read more
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more