<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>PhishPond.io — Field notes</title><description>Short, opinionated essays on phishing, social engineering, and link forensics.</description><link>https://phishpond.io/</link><language>en-us</language><item><title>The Ghost in the URL: Deconstructing AI-Augmented Obfuscation Networks</title><link>https://phishpond.io/blog/link-analysis/deconstructing-ai-phishing-obfuscation/</link><guid isPermaLink="true">https://phishpond.io/blog/link-analysis/deconstructing-ai-phishing-obfuscation/</guid><description>An authoritative deep dive into how AI-driven obfuscation bypasses traditional secure email gateways and how to use PhishPond tools to reveal hidden threats.</description><pubDate>Fri, 15 May 2026 00:00:00 GMT</pubDate><category>link-analysis</category><category>ai-threats</category><category>obfuscation</category><category>cybersecurity</category><category>phishpond</category></item><item><title>The Imposter in the Lobby: Defeating Real-Time AI Video Clones</title><link>https://phishpond.io/blog/social-engineering/defeating-real-time-ai-deepfake-clones/</link><guid isPermaLink="true">https://phishpond.io/blog/social-engineering/defeating-real-time-ai-deepfake-clones/</guid><description>A deep dive into the rise of Deepfake-as-a-Service (DaaS) and how to identify and defeat real-time AI video clones during corporate calls.</description><pubDate>Fri, 15 May 2026 00:00:00 GMT</pubDate><category>social-engineering</category><category>deepfake</category><category>ai-cloning</category><category>daas</category><category>corporate-espionage</category><category>phishpond</category></item><item><title>The Proxy Pandemic: Why Modern Phishing Ignores Your MFA</title><link>https://phishpond.io/blog/identity-security/aitm-phishing-bypasses-mfa/</link><guid isPermaLink="true">https://phishpond.io/blog/identity-security/aitm-phishing-bypasses-mfa/</guid><description>A comprehensive guide to Adversary-in-the-Middle (AiTM) attacks. Learn how proxies bypass MFA and how to secure your identity with phishpond.io.</description><pubDate>Thu, 14 May 2026 00:00:00 GMT</pubDate><category>cybersecurity</category><category>phishing</category><category>mfa-bypass</category><category>threat-hunting</category><category>identity-security</category><category>phishpond</category></item><item><title>AI Vishing: When the Voice on the Phone Isn&apos;t Family</title><link>https://phishpond.io/blog/social-engineering/ai-voice-clone-vishing/</link><guid isPermaLink="true">https://phishpond.io/blog/social-engineering/ai-voice-clone-vishing/</guid><description>AI voice cloning has turned vishing into a terrifyingly personal threat. Learn how to identify voice scams and protect your family in 2026.</description><pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate><category>vishing</category><category>ai-voice-cloning</category><category>social-engineering</category><category>phishpond</category><category>cybersecurity</category></item><item><title>Quishing 101: Why You Should Never Blindly Scan a QR Code</title><link>https://phishpond.io/blog/social-engineering/how-to-spot-quishing-scams/</link><guid isPermaLink="true">https://phishpond.io/blog/social-engineering/how-to-spot-quishing-scams/</guid><description>QR code phishing, or quishing, is the latest physical-to-digital threat. Learn how to spot malicious codes at restaurants and parking meters.</description><pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate><category>quishing</category><category>qr-code-scams</category><category>cybersecurity</category><category>phishpond</category><category>mobile-security</category></item><item><title>Verify Before You Click: Stop Delivery Smishing</title><link>https://phishpond.io/blog/social-engineering/how-to-spot-smishing/</link><guid isPermaLink="true">https://phishpond.io/blog/social-engineering/how-to-spot-smishing/</guid><description>That text about a held package is likely a trap. Learn how the 2026 incomplete address scam works and how to verify delivery links safely using phishpond.io.</description><pubDate>Thu, 07 May 2026 00:00:00 GMT</pubDate><category>smishing</category><category>delivery-scams</category><category>cybersecurity</category><category>link-analysis</category><category>phishpond</category><category>safe-browsing</category></item><item><title>Why the Top Google Result is a Scam: A Guide to SEO Poisoning</title><link>https://phishpond.io/blog/link-analysis/google-ad-scams-seo-poisoning/</link><guid isPermaLink="true">https://phishpond.io/blog/link-analysis/google-ad-scams-seo-poisoning/</guid><description>Why is the first result on Google a scam? Learn how SEO poisoning and malvertising work in 2026, how to spot typosquatting, and how to check suspicious links before you click.</description><pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate><category>seo-poisoning</category><category>malvertising</category><category>google-ads</category><category>cybersecurity</category><category>malware-prevention</category><category>phishpond</category><category>safe-browsing</category></item><item><title>My Discord Account Was Hacked: The 2026 Step by Step Recovery Guide</title><link>https://phishpond.io/blog/social-engineering/recover-discord-account/</link><guid isPermaLink="true">https://phishpond.io/blog/social-engineering/recover-discord-account/</guid><description>Hacked on Discord? If your email was changed and your password doesn&apos;t work, follow our 2026 recovery guide to get your account back from scammers instantly.</description><pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate><category>discord</category><category>account-recovery</category><category>hacked</category><category>cybersecurity</category><category>token-logging</category><category>phishpond</category><category>digital-safety</category></item><item><title>MFA is Not a Silver Bullet: How Scammers Hijack Your Active Sessions</title><link>https://phishpond.io/blog/social-engineering/mfa-session-hijacking/</link><guid isPermaLink="true">https://phishpond.io/blog/social-engineering/mfa-session-hijacking/</guid><description>MFA alone won&apos;t save you from session hijacking. Learn how AiTM attacks bypass your security and protect your tokens with PhishPond.io. Stay safe in 2026.</description><pubDate>Fri, 01 May 2026 00:00:00 GMT</pubDate><category>mfa</category><category>session-hijacking</category><category>aitm</category><category>cybersecurity</category><category>identity-protection</category><category>multi-factor-authentication</category><category>account-security</category><category>phishing-prevention</category></item><item><title>How to Check if a Link is a Scam (2026 Guide)</title><link>https://phishpond.io/blog/link-analysis/check-if-a-link-is-a-scam/</link><guid isPermaLink="true">https://phishpond.io/blog/link-analysis/check-if-a-link-is-a-scam/</guid><description>Stop clicking and start scanning. Learn how to check if a link is a scam in 2026 with PhishPond.io. Spot AI threats and protect your data instantly.</description><pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate><category>technical</category><category>link-analysis</category><category>phishing</category><category>cybersecurity</category><category>scam-detection</category><category>url-scanner</category></item><item><title>Reading a redirect chain: what your browser does not show you</title><link>https://phishpond.io/blog/link-analysis/reading-a-redirect-chain/</link><guid isPermaLink="true">https://phishpond.io/blog/link-analysis/reading-a-redirect-chain/</guid><description>A shortened URL is not one link — it is the visible front of a chain that can run six or seven hops deep. Here is how to walk that chain safely and what to look for at each step.</description><pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate><category>technical</category><category>link-analysis</category><category>phishing</category><category>cybersecurity</category><category>url-analysis</category><category>redirect-chain</category></item><item><title>Why &quot;urgent&quot; is the most dangerous word in your inbox</title><link>https://phishpond.io/blog/social-engineering/why-urgent-is-dangerous/</link><guid isPermaLink="true">https://phishpond.io/blog/social-engineering/why-urgent-is-dangerous/</guid><description>The single most reliable signal that a message is a phishing attempt is artificial time pressure. Here is why it works on everyone — and how to defuse it.</description><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><category>social-engineering</category><category>fundamentals</category><category>phishing</category><category>email-security</category><category>cybersecurity</category></item></channel></rss>