The Ultimate Guide to Phishing
2024 edition
Overview
Generally associated with unsolicited emails sent by a hacker to a wide range of targets, phishing is a ‘bait and switch’ tactic designed to trick targets into revealing personal information such as passwords or credit card details. The phishing email purports to be from a known party such as a bank or a colleague and requests a response which can include redirection to a spoof website where (for example) the target is encouraged to bank usernames or passwords. Phishing is a form of social engineering.
Analyst reports
Osterman Research on Advanced Persistent Threat Protection
Report: 80% of critical infrastructure hit by email bre...
Yesterday
Gartner on Email Security
Arctic Wolf enhances identity protection with new ITDR ...
Thu, 13th Jun 2024
IDC on Malware
Check Point launches Quantum Spark to boost cybersecuri...
Fri, 2nd Feb 2024
IDC on Malware
Fortinet report reveals cyber threats & defence gaps in...
Fri, 2nd Feb 2024
Gartner on Cloud Security
2024 to witness renewed focus on cyber resilience
Wed, 20th Dec 2023
Expert columns
By Mark Knowles of Xero
Four tips to protect your business from cybercriminals
2 days ago
By Innes Muir of Logpoint
How MDR will transform cybersecurity in the mid-market
4 days ago
By Crispin Kerr of Proofpoint
GenAI: A new era of social engineering threats for Aust...
This month
By Talent International
The impact of digital transformation on the financial s...
Last month
By Janine Morris of AvePoint
Strengthening an organisations cybersecurity posture in...
Last month
More expert columns
By Stephen Kho of Avast
You’re telling me that ad was fake? Malvertising is sne...
Last month
By Ashley Diffey of Ping Identity
How healthcare providers can tighten security using ide...
Thu, 11th Jul 2024
By Stephen Kho of Avast
YouTube, the backdrop of a scammer’s play
Thu, 20th Jun 2024
By Dakshitaa Babu of SquareX
Why data still leaks through enterprise DLP solutions
Wed, 19th Jun 2024
By Cradlepoint
Singapore cyber security bill amendment: Securing your ...
Tue, 11th Jun 2024
By Stephen Kho of Avast
What is MFA bombing? Apple users were targeted using th...
Fri, 7th Jun 2024
Top players
You can read more from the top players Recogni, KnowBe4, 2degrees, Barracuda Networks, and Check Point Software.
Recent news
About Elections
Ensign InfoSecurity launches real-time deepfake detecti...
Today
About Ransomware
Financial services sector remains top DDoS target, Akam...
Today
About Firewalls
Australian firms to boost cybersecurity budgets by next...
Today
About Scams
Financial losses from NZ cybercrime rise to $6.8m in Q2...
Today
About Network Infrastructure
Report finds financial services most targeted by DDoS a...
3 days ago
More news
About Malware
Ministry, Indosat, Mastercard Launch Cybersecurity Onli...
4 days ago
About EduTech
Content platforms exploited for phishing attacks, warns...
4 days ago
About Malware
Indonesia's Kominfo teams with Indosat & Mastercard for...
Last week
About Dark web
Kaspersky: Cyberattacks on young gamers surge by 30%
Last week
About Scams
Apple iPhone 16 launch triggers wave of scams – Kaspers...
Last week
Even more news
About Malware
Bitdefender unveils first comprehensive security for cr...
Last week
About Malware
Indosat launches IMSecure to bolster customer data prot...
This month
About Firewalls
Okta boosts security with new identity management tools
Last month
About Diversity, Equity & Inclusion
Women in Cyber interview with Yubico's Co-Founder and n...
Last month
About Scams
Optus saves Australians USD $250 million with Call Stop...
Last month
Other guides
You can read other related guides from Email Security, Cybersecurity, Breach Prevention, Malware, and Firewalls.
Powered by