Entropius Research
Threat intelligence research, analysis, and insights
#redirect-chains#phishing#navigation-tracking#html-smuggling#threat-detection
Anatomy of a Scam Redirect Chain: Every Trick in the PlaybookFrom HTTP 302 hops to blob URL smuggling, SVG smuggling, WASM obfuscation, AiTM proxying, and WebSocket-triggered redirects — a complete field guide to the 30+ redirect and evasion techniques scammers use to hide phishing pages, with code samples for each.
Entropius Research
2/22/2026
#phishing#http-protocol#cloaking#threat-detection#AI
Scammers and the HTTP ProtocolHow scammers weaponize HTTP redirects, geolocation, timestamps, device headers, and dynamic rendering to evade detection, and why stopping them is harder than you think.
Entropius Research
2/11/2026
#threat-intelligence#real-time-detection#infrastructure-analysis#AI
Why Real-Time Threat Infrastructure Detection Changes EverythingAttackers spin up infrastructure in minutes. Blocklists update in hours or days. Closing that gap requires a fundamentally different approach to threat detection.
Entropius Research
2/10/2026