Entropius Research

Threat intelligence research, analysis, and insights

Anatomy of a Scam Redirect Chain: Every Trick in the Playbook
#redirect-chains#phishing#navigation-tracking#html-smuggling#threat-detection
Anatomy of a Scam Redirect Chain: Every Trick in the Playbook

From HTTP 302 hops to blob URL smuggling, SVG smuggling, WASM obfuscation, AiTM proxying, and WebSocket-triggered redirects — a complete field guide to the 30+ redirect and evasion techniques scammers use to hide phishing pages, with code samples for each.

Entropius Research

Entropius Research

2/22/2026

Scammers and the HTTP Protocol
#phishing#http-protocol#cloaking#threat-detection#AI
Scammers and the HTTP Protocol

How scammers weaponize HTTP redirects, geolocation, timestamps, device headers, and dynamic rendering to evade detection, and why stopping them is harder than you think.

Entropius Research

Entropius Research

2/11/2026

Why Real-Time Threat Infrastructure Detection Changes Everything
#threat-intelligence#real-time-detection#infrastructure-analysis#AI
Why Real-Time Threat Infrastructure Detection Changes Everything

Attackers spin up infrastructure in minutes. Blocklists update in hours or days. Closing that gap requires a fundamentally different approach to threat detection.

Entropius Research

Entropius Research

2/10/2026