Malicious URL

24th September 2020 | Cybrary Malicious URL


malicious URLs

A Malicious URL is a link created with the purpose of promoting scams, attacks, and fraud. By clicking on an infected URL, you may download malware or a trojan that can take control of your device, or you might be persuaded into providing personal information on a fake website such as your username and password. Malicious URLs are often seen embedded in phishing attacks, tricking users into clicking on the link(s). Hackers use techniques like “typosquatting” to make malicious URLs look legitimate. For example, the URL is r n icrosoft.com rather than microsoft.com can be used to trick users due to it looking legitimate at a glance.

Source: Gatefy

Additional Reading: Smishing, The New Phishing

Related Terms: Typosquatting, Phishing, Trojan Horse

What does this mean for a Business Owner or Employee?

Businesses should be doing all they can to reduce the likelihood of employees falling victim to malicious URLs or other cyber risks. CyberHoot recommends following these best practices to help your organization stay more secure:

Nothing you do will guarantee you cannot be compromised. However, doing these things proactively will act like the ounce of prevention Ben Franklin was fond of talking about with respect to Fire prevention.  It’s worth a pound of cure during a fire (or a breach).  Watch the video below for more details on these attacks.

To learn more about malicious URLs through typosquatting, watch this short video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more
MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...

Read more
QR Codes Are Back (They Still Want Your Password)

QR Codes Are Back (They Still Want Your Password)

Remember 2020? We scanned QR codes for everything. Restaurant menus. Parking meters. That awkward moment at a...

Read more