Phishing page hiding itself using dynamically adjusted IP-based allow list, (Wed, Nov 24th)

It can be instructive to closely examine even completely usual-looking phishing messages from time to time, since they may lead one to unusual phishing sites[1] or may perhaps use some novel technique that might not be obvious at first glance[2].

Article Link: InfoSec Handlers Diary Blog