Welcome back to The Lost Bots! In our latest episode, we're talking about phishing attacks — but not your standard run-of-the-mill version. Instead, we're focusing on a new technique known as browser-in-browser attacks, unpacking what it means and how it should factor into your organization's security strategy.
Our hosts Jeffrey Gardner, Detection and Response Practice Advisor, and Stephen Davis, Lead D&R Sales Technical Advisor, highlight the telltale signs of browser-in-browser attacks you should look out for as you're carrying out your day-to-day work and life on the internet. They also discuss how to set up user behavior analytics rules in your SIEM that will help you detect this type of threat, as well as how to make end-user training more effective.
Check back with us on Thursday, September 29, for the next Lost Bots installment!
Additional reading:
- [The Lost Bots] Season 2, Episode 2: The Worst and Best Hollywood Cybersecurity Depictions
- [The Lost Bots] Season 2, Episode 1: SIEM Deployment in 10 Minutes
- Cybersecurity Analysts: Job Stress Is Bad, but Boredom Is Kryptonite
- 3 Mistakes Companies Make in Their Detection and Response Programs
NEVER MISS A BLOG
Get the latest stories, expertise, and news about security today.
SubscribeArticle Tags
Related blog posts

Vulnerabilities and Exploits
ClickFix Phishing Campaign Masquerading as a Claude Installer
Nicholas Spagnola

Threat Research
Initial Access Brokers have Shifted to High-Value Targets and Premium Pricing
Rapid7 Labs
Threat Research
Carding-as-a-Service: The Underground Market of Stolen Cards
Alexandra Blia, Maor Weinberger +1

Detection and Response
Threat Actors Using AWS WorkMail in Phishing Campaigns
Jan Blažek, Calvin House
![[The Lost Bots] S02E03: Browser-in-Browser Attacks — Don't Get (Cat)-Phished](/_next/image/?url=https%3A%2F%2Fwww.rapid7.com%2Fcdn%2Fimages%2Fblt82cd5c06bb93678c%2F683ddbdc3e68ee73768897fa%2F-The-Lost-Bots--Episode-1--External-Threat-Intelligence.png&w=3840&q=75)