Know your enemy.
A living reference of phishing techniques, evasion tactics, and BEC patterns — with plain-English explanations of how each attack works and how Cambrient's agents catch them.
Multi-Hop Redirect Chain
Attackers route victims through 2–5 intermediate domains — often legitimate services like Bit.ly, Firebase, or Cloudflare Pages — before landing on the credential harvester. Each hop looks clean individually. URL reputation checkers never follow the chain.
Cambrient's agents follow every redirect hop, render each page, and evaluate content at each step. The chain terminates when the agent finds a login form that doesn't match the claimed sender.
A phishing campaign targeting HR departments used LinkedIn redirect parameters as the first hop, routing through a legitimate career portal before landing on a fake DocuSign credential harvester. Defender delivered it cleanly.
See how Cambrient catches all of these.
Book a demo and we'll run a live example of any attack in this library against your domain.