Skip to main content

Detection of Cyberthreats with Computer Vision (Part 2)

·126 words·1 min· loading · loading ·
Cybersecurity Computer Vision Phishing

I’m excited to share my latest blog post, published on Hornetsecurity’s website, where I explore the challenges of detecting duplicate and near-duplicate images in cybersecurity. Attackers often tweak phishing images to evade detection, making traditional filtering methods less effective.

In this article, I break down hash-based techniques and color histograms, two key approaches to spotting manipulated images. These methods lay the groundwork for more advanced detection strategies to counter evolving threats.

If you’re interested in the broader topic, the first part of this series was written by Sebastien Goutal: you can check it out here.

Read my full article on Hornetsecurity’s website: Detection of Cyberthreats with Computer Vision (Part 2).

Let me know your thoughts, and stay tuned for more insights on image analysis in cybersecurity!

Damien Riquet
Author
Damien Riquet
PhD | Lead Research Engineer at Vade / Hornetsecurity