Welcome to Checkphish! 👋

Hello!

We’re thrilled to have you be part of the anti-phishing community :blush:

checkphish

community to discuss all things phishing: from best practices to step by step guides on how to take down a site

Here are some things you can do to get started:

:speaking_head: Introduce yourself by adding your picture and information about yourself and your interests to your profile. What is one thing you’d like to be asked about?

:open_book: Get to know the community by browsing discussions that are already happening here. When you find a post interesting, informative, or entertaining, use the :heart: to show your appreciation or support!

:handshake: Contribute by commenting, sharing your own perspective, asking questions, or offering feedback in the discussion. Before replying or starting new topics, please review the Community Guidelines.

If you need help or have a suggestion, feel free to ask in #site-feedback or contact the admins.

Here is alittle about us and our mission:

:star: The Checkphish Community is designed to facilitate collaboration and knowledge sharing for anyone interested in combating phishing attacks. Our community consists of subject matter experts, security researchers, and enthusiasts who are dedicated to identifying and mitigating phishing threats.

Community Objectives :bow_and_arrow:

:bulb: Share Insights: Discuss and share insights, experiences, and best practices related to identifying, preventing, and mitigating phishing attacks.

:bookmark: Seek Help: Seek guidance and expertise from community members on phishing-related topics.

:eyeglasses: Stay Informed: Stay updated on the latest phishing trends, techniques, and countermeasures through insightful discussions and knowledge exchange.

Who are the mods? :nerd_face:
The mods are security professionals and researchers who have a background in information security, machine learning, and related fields of cybersecurity, IT, and A.I. Essentially we’re just nerds who want to share our knowledge on how to combat phishing attacks.

Let’s get started! :rocket:

:question: How to ask a question?
We encourage active engagement within the Checkphish Community Forum, and asking questions is highly encouraged. To ask a question and receive helpful responses, follow these steps:

  1. Sign up: If you haven’t already, create an account on the forum by clicking on “Sign Up” on the top right button to access all the features and privileges available to members.
  2. Browse Existing Topics: Use the search function or explore existing topics to see if your question has already been addressed or if similar discussions are already underway. (ie. How to do a phishing takedown on AWS Hosting?)
  3. Start a New Topic: If you can’t find an existing discussion that addresses your question, start a new topic in the relevant category. Provide a clear and concise title that accurately reflects your question.
  4. Provide Context: In your post, provide relevant context and any additional details necessary to help the community understand your question.
  5. Be Respectful: Engage with other community members in a respectful and constructive manner. Follow the forum guidelines and respect the diversity of opinions and experiences within the community.
  6. Engage in the Discussion: Monitor your question and actively engage with community members who respond to your query. Be open to suggestions, and feel free to ask for clarification if needed.

Remember, the Checkphish Community Forum thrives on collaboration and the sharing of knowledge. Make the most of this vibrant platform, and together, let’s strengthen our defenses against phishing attacks!

If you have any further inquiries or need assistance, feel free to reach out to our community mods!

Happy discussing and learning! :heart_eyes:

1 Like