The Ultimate Guide to Phishing
2024 edition
Overview
Generally associated with unsolicited emails sent by a hacker to a wide range of targets, phishing is a ‘bait and switch’ tactic designed to trick targets into revealing personal information such as passwords or credit card details. The phishing email purports to be from a known party such as a bank or a colleague and requests a response which can include redirection to a spoof website where (for example) the target is encouraged to bank usernames or passwords. Phishing is a form of social engineering.
Analyst reports
Osterman Research on Advanced Persistent Threat Protection
Report: 80% of critical infrastructure hit by email bre...
Today
Gartner on Email Security
Arctic Wolf enhances identity protection with new ITDR ...
Thu, 13th Jun 2024
IDC on Malware
Check Point launches Quantum Spark to boost cybersecuri...
Fri, 2nd Feb 2024
IDC on Malware
Fortinet report reveals cyber threats & defence gaps in...
Fri, 2nd Feb 2024
Gartner on Cloud Security
2024 to witness renewed focus on cyber resilience
Wed, 20th Dec 2023
Expert columns
By Mark Knowles of Xero
Four tips to protect your business from cybercriminals
Yesterday
By Innes Muir of Logpoint
How MDR will transform cybersecurity in the mid-market
3 days ago
By Crispin Kerr of Proofpoint
GenAI: A new era of social engineering threats for Aust...
This month
By Talent International
The impact of digital transformation on the financial s...
Last month
By Janine Morris of AvePoint
Strengthening an organisations cybersecurity posture in...
Last month
More expert columns
By Stephen Kho of Avast
You’re telling me that ad was fake? Malvertising is sne...
Last month
By Ashley Diffey of Ping Identity
How healthcare providers can tighten security using ide...
Thu, 11th Jul 2024
By Stephen Kho of Avast
YouTube, the backdrop of a scammer’s play
Thu, 20th Jun 2024
By Dakshitaa Babu of SquareX
Why data still leaks through enterprise DLP solutions
Wed, 19th Jun 2024
By Cradlepoint
Singapore cyber security bill amendment: Securing your ...
Tue, 11th Jun 2024
By Stephen Kho of Avast
What is MFA bombing? Apple users were targeted using th...
Fri, 7th Jun 2024
Top players
You can read more from the top players Recogni, KnowBe4, 2degrees, Barracuda Networks, and Check Point Software.
Recent news
About Network Infrastructure
Report finds financial services most targeted by DDoS a...
Yesterday
About Malware
Ministry, Indosat, Mastercard Launch Cybersecurity Onli...
3 days ago
About EduTech
Content platforms exploited for phishing attacks, warns...
3 days ago
About Malware
Indonesia's Kominfo teams with Indosat & Mastercard for...
Last week
About Dark web
Kaspersky: Cyberattacks on young gamers surge by 30%
Last week
More news
About Scams
Apple iPhone 16 launch triggers wave of scams – Kaspers...
Last week
About Malware
Bitdefender unveils first comprehensive security for cr...
Last week
About Malware
Indosat launches IMSecure to bolster customer data prot...
This month
About Firewalls
Okta boosts security with new identity management tools
Last month
About Diversity, Equity & Inclusion
Women in Cyber interview with Yubico's Co-Founder and n...
Last month
Even more news
About Scams
Optus saves Australians USD $250 million with Call Stop...
Last month
About Unified Communications
N-able announces new vendor integrations to enhance MSP...
Last month
About IT support
New report shows DMARC enforcement gap in NZ & Australi...
Last month
About Construction
Abnormal sees 350% uptick in phishing via file-sharing ...
Last month
About Ransomware
Rising deepfake threats prompt surge in biometric defen...
Last month
Other guides
You can read other related guides from Email Security, Cybersecurity, Breach Prevention, Malware, and Firewalls.
Powered by