![From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud - Microsoft Security Blog From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud - Microsoft Security Blog](https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2022/07/social-aitm-phishing.png)
From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud - Microsoft Security Blog
![Electronics | Free Full-Text | An Effective Phishing Detection Model Based on Character Level Convolutional Neural Network from URL Electronics | Free Full-Text | An Effective Phishing Detection Model Based on Character Level Convolutional Neural Network from URL](https://pub.mdpi-res.com/electronics/electronics-09-01514/article_deploy/html/images/electronics-09-01514-g001.png?1600422468)
Electronics | Free Full-Text | An Effective Phishing Detection Model Based on Character Level Convolutional Neural Network from URL
![An effective detection approach for phishing websites using URL and HTML features | Scientific Reports An effective detection approach for phishing websites using URL and HTML features | Scientific Reports](https://media.springernature.com/lw685/springer-static/image/art%3A10.1038%2Fs41598-022-10841-5/MediaObjects/41598_2022_10841_Fig1_HTML.png)
An effective detection approach for phishing websites using URL and HTML features | Scientific Reports
![JPCERT/CC Releases URL Dataset of Confirmed Phishing Sites - JPCERT/CC Eyes | JPCERT Coordination Center official Blog JPCERT/CC Releases URL Dataset of Confirmed Phishing Sites - JPCERT/CC Eyes | JPCERT Coordination Center official Blog](https://blogs.jpcert.or.jp/en/.assets/thumbnail/phishurl-fig1-640wri.png)