Hi HN folks, I’m building BrandRetina (brandretina.ai), an API-first service to catch high-fidelity spear-phishing that looks like your real internal portals..

Most scanners are great at "bad code" (malware/reputation), but lots of modern phishing is just a clean site that visually impersonates Okta/SSO/Workday/customer portals. SOC teams often end up doing the manual step: open urlscan screenshot -> eyeball it -> decide.

What BrandRetina does:

- You onboard a "Golden Registry" (verified screenshots of your real portals) - When a suspicious link comes in, your SOAR detonates it (e.g., urlscan.io) and gets a screenshot UUID - BrandRetina compares the screenshot against the Golden Registry (visual embeddings / similarity) and returns:

1) verdict (CLEAN/SUSPICIOUS/MALICIOUS) 2) si...

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help