With Version 3, would-be phishers can cut and paste a big brand’s URL into a template and let automation do the rest. Please leave this field empty Oh hi there 👋It’s nice to meet you. Sign up to receive awesome content in your inbox, every month. We don’t spam! Read our privacy policy for more info. Check your inbox or spam folder to confirm your subscription. Please leave this field empty Oh hi there 👋It’s nice to meet you. Sign up to receive awesome content in your inbox, every month. We don’t spam! Read our privacy policy for more info. Check your inbox or spam folder to confirm your subscription. Post navigation Citrix addressed NetScaler console privilege escalation flawMicrosoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now