Can We Move Past Blocklists to Automated Takedowns?
In the struggle to prevent phishing, cyber defenders use URL blocklists. URL blocklists are ever-changing and difficult to keep current. Attackers make use of automation and other methods to bypass their effectiveness. Rather than everyone struggling to keep their ever-changing blocklists accurate...