The Ultimate Guide to Phishing
2025 edition
Overview
Generally associated with unsolicited emails sent by a hacker to a wide range of targets, phishing is a ‘bait and switch’ tactic designed to trick targets into revealing personal information such as passwords or credit card details. The phishing email purports to be from a known party such as a bank or a colleague and requests a response which can include redirection to a spoof website where (for example) the target is encouraged to bank usernames or passwords. Phishing is a form of social engineering.
Analyst reports
IDC MarketScape on Malware
Sophos MDR services protect 26,000 organisations global...
Last week
Gartner on Advanced Persistent Threat Protection
Trend Micro named leader in Gartner email security revi...
Last month
Osterman Research on Advanced Persistent Threat Protection
Report: 80% of critical infrastructure hit by email bre...
Thu, 19th Sep 2024
Gartner on Email Security
Arctic Wolf enhances identity protection with new ITDR ...
Thu, 13th Jun 2024
IDC on Malware
Check Point launches Quantum Spark to boost cybersecuri...
Fri, 2nd Feb 2024
Expert columns
By Yubico
Cybersecurity in 2025: Insights and predictions from Yu...
Last week
By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Last month
By Sneha Banerjee of ManageEngine
Sneaky scams to watch for this holiday season (and how ...
Last month
By Curtis Raams of Prvidr
Countering the security threat from within
Last month
By Matt Caffrey of Barracuda ANZ
The top cybersecurity predictions for businesses in 202...
Last month
Interviews
Discussing Firewalls
Exclusive: Radware SVP Travis Volk discusses evolving c...
Last month
Discussing Collaboration
Exclusive: Qualys MD discusses cybersecurity in ANZ reg...
Last month
Discussing Digital Transformation
CyberArk highlights new security threats at Impact Worl...
Fri, 25th Oct 2024
Discussing Firewalls
Okta's redrawing its cybersecurity boundaries, says CSO
Fri, 18th Oct 2024
Discussing Ransomware
Exclusive: Mandiant Consulting highlights evolving cybe...
Fri, 11th Oct 2024
More expert columns
By Derek Manky of Fortinet
Threat predictions for 2025: Get ready for bigger, bold...
Fri, 29th Nov 2024
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024
By COSBOA
Join the fight against cyber crime: Enrol in Cyber Ward...
Tue, 5th Nov 2024
By Matt Caffrey of Barracuda
Why you need layered email security to protect against ...
Thu, 17th Oct 2024
By Stephen Kho of Avast
Protect your mini-me: How to prevent child identity the...
Thu, 17th Oct 2024
By Matthew Salier of Australian Cyber Collaboration Centre
How we can help younger Australians tackle cybersecurit...
Tue, 15th Oct 2024
Recent news
About Malware
EY report highlights AI trends & challenges for 2025
Yesterday
About Malware
Scammers exploit LA wildfires with QR code phishing
Last week
About IT Training
KnowBe4 study reveals critical role of security awarene...
Last week
About Ransomware
Ransomware attacks soared in 2024, new groups emerge
Last week
About Social Engineering
KnowBe4 report links training to fewer data breaches
Last week
More news
About Malware
UK SMEs focus on AI threats over traditional cyber risk...
Last week
About Cyber Threats
Kaspersky launches courses to strengthen cyber skills
Last week
About Malware
Infoblox uncovers cyber threats exploiting domain spoof...
Last week
About Malware
AI threats top concern for UK SMEs' cybersecurity in 20...
Last week
About Social Media
Gen Z & Millennials face higher social media compromise...
Last week
Even more news
About Cloud Services
AI-driven phishing & malware threats to rise by 2025
This month
About Machine learning
AI technology: A game changer for cybercriminals global...
This month
About Threat intelligence
Phishing attacks rise in 2024 with AI-driven tactics
This month
About Malware
Kaspersky warns of increasing threats from tampered NFC...
Last month
About Advanced Persistent Threat Protection
SquareX reveals critical breach of Cyberhaven extension
Last month
Other guides
You can read other related guides from Email Security, Cybersecurity, Breach Prevention, Advanced Persistent Threat Protection, and Artificial Intelligence.
Powered by