The Ultimate Guide to Phishing
2024 edition
Overview
Generally associated with unsolicited emails sent by a hacker to a wide range of targets, phishing is a ‘bait and switch’ tactic designed to trick targets into revealing personal information such as passwords or credit card details. The phishing email purports to be from a known party such as a bank or a colleague and requests a response which can include redirection to a spoof website where (for example) the target is encouraged to bank usernames or passwords. Phishing is a form of social engineering.
Analyst reports
Osterman Research on Advanced Persistent Threat Protection
Report: 80% of critical infrastructure hit by email bre...
Thu, 19th Sep 2024
Gartner on Email Security
Arctic Wolf enhances identity protection with new ITDR ...
Thu, 13th Jun 2024
IDC on Malware
Check Point launches Quantum Spark to boost cybersecuri...
Fri, 2nd Feb 2024
IDC on Malware
Fortinet report reveals cyber threats & defence gaps in...
Fri, 2nd Feb 2024
Gartner on Cloud Security
2024 to witness renewed focus on cyber resilience
Wed, 20th Dec 2023
Expert columns
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Last week
By COSBOA
Join the fight against cyber crime: Enrol in Cyber Ward...
This month
By Matt Caffrey of Barracuda
Why you need layered email security to protect against ...
Last month
By Stephen Kho of Avast
Protect your mini-me: How to prevent child identity the...
Last month
By Matthew Salier of Australian Cyber Collaboration Centre
How we can help younger Australians tackle cybersecurit...
Last month
Interviews
Discussing Digital Transformation
CyberArk highlights new security threats at Impact Worl...
Last month
Discussing Firewalls
Okta's redrawing its cybersecurity boundaries, says CSO
Last month
Discussing Ransomware
Exclusive: Mandiant Consulting highlights evolving cybe...
Last month
Discussing EduTech
Exclusive: Why creating phishing-resistant users is key...
Thu, 4th Jul 2024
Discussing Software-as-a-Service
Exclusive: How Katana is supporting Paralympics New Zea...
Tue, 4th Jun 2024
More expert columns
By Derek Manky of Fortinet
As attackers embrace artificial intelligence, every org...
Last month
By Mark Knowles of Xero
Four tips to protect your business from cybercriminals
Wed, 18th Sep 2024
By Innes Muir of Logpoint
How MDR will transform cybersecurity in the mid-market
Mon, 16th Sep 2024
By Crispin Kerr of Proofpoint
GenAI: A new era of social engineering threats for Aust...
Tue, 3rd Sep 2024
By Talent International
The impact of digital transformation on the financial s...
Fri, 16th Aug 2024
By Janine Morris of AvePoint
Strengthening an organisations cybersecurity posture in...
Fri, 9th Aug 2024
Top players
Recent news
About Threat intelligence
Cofense report: Sophisticated email threats on the rise
Today
About Malware
Check Point unveils AI-powered Quantum Firewall Softwar...
Today
About Malware
Cyberattack spreads malware via Facebook ads in Europe
Yesterday
About Digitisation
AI-driven fraud & deepfakes pose escalating global thre...
Yesterday
About Ransomware
AI's growing impact on cybersecurity threat & defence
Yesterday
More news
About Malware
Gen's report reveals 614% surge in 'Scam-Yourself Attac...
Yesterday
About Online security
Public anxiety over AI-driven cyber threats rising
2 days ago
About Ransomware
Businesses fear AI's role in rising cyberattack threats
2 days ago
About Malware
BlackFog unveils advanced platform for ransomware defen...
2 days ago
About Malware
Sextortion scams surge with personal data to extort mon...
3 days ago
Even more news
About Security Information and Event Management
Tesserent warns AI will fuel cyber threats by 2025
Last week
About EduTech
Social media scams cost Australian children AUD $129,70...
Last week
About Ransomware
Google Cloud warns of AI escalation in cyber threats by...
Last week
About Firewalls
Experts urge vigilance against growing digital fraud ri...
Last week
About Malware
Kaspersky aids INTERPOL in disrupting global cybercrime
Last week
Other guides
You can read other related guides from Email Security, Cybersecurity, Breach Prevention, Malware, and Advanced Persistent Threat Protection.
Powered by