The Ultimate Guide to Phishing
2024 edition
Overview
Generally associated with unsolicited emails sent by a hacker to a wide range of targets, phishing is a ‘bait and switch’ tactic designed to trick targets into revealing personal information such as passwords or credit card details. The phishing email purports to be from a known party such as a bank or a colleague and requests a response which can include redirection to a spoof website where (for example) the target is encouraged to bank usernames or passwords. Phishing is a form of social engineering.
Analyst reports
IDC on Malware
Check Point launches Quantum Spark to boost cybersecuri...
Last month
IDC on Malware
Fortinet report reveals cyber threats & defence gaps in...
Last month
Gartner on Cloud Security
2024 to witness renewed focus on cyber resilience
Wed, 20th Dec 2023
Gartner on Email Security
EasyDMARC launches EasySender to improve email delivera...
Mon, 23rd Oct 2023
Gartner on Cloud Services
High phishing rates among remote workers across Austral...
Mon, 16th Oct 2023
Expert columns
By Nick Turnbull of BeyondTrust
The role of Privilege Access Management in achieving ro...
Last month
By Paul Crighton of Barracuda Networks
Festive season alert: Rising cybercrime threatens busin...
Wed, 29th Nov 2023
By Uri Dorot of Radware
Generative AI: A disruptive force at the hands of cyber...
Tue, 31st Oct 2023
By Alastair Paterson of Harmonic Security
Hopes for the global Artificial Intelligence summit
Mon, 30th Oct 2023
By Ilan Rubin of Wavelink
Four steps organisations can take to improve cybersecur...
Thu, 19th Oct 2023
More expert columns
By Edy Almer of Logpoint
The Artificial Intelligence arms race
Tue, 10th Oct 2023
By Kern Smith of Zimperium
BYOD and mobile devices heighten healthcare cyber risks
Fri, 15th Sep 2023
By Alex Low of StarHub Enterprise Business Group
If you are using public WiFi for work, stop!
Tue, 12th Sep 2023
By Mark Fioretto of UiPath
How automation will bolster cybersecurity in Australia
Wed, 2nd Aug 2023
By Apu Pavithran of Hexnode
Safeguarding critical Infrastructures from cyber threat...
Mon, 31st Jul 2023
By Jonathan Beeby of SAP Concur Australia and New Zealand
Preventing invoice fraud with automated invoice process...
Tue, 11th Jul 2023
Top players
You can read more from the top players KnowBe4, 2degrees, Check Point Software, Barracuda Networks, and Proofpoint.
Recent news
About Threat intelligence
AI bolsters security response times, reveals ReliaQuest...
Yesterday
About Social Engineering
UK banks join Singapore's cyber scam defence programme ...
Yesterday
About Threat intelligence
Heritage Lifecare looks to SSS for around the clock cyb...
Last week
About Malware
Spark unveils online protections against cyber hazards ...
Last week
About Malware
Ransomware attacks against companies rise by 27% in 202...
Last week
More news
About PayPal
Trustwave report unveils cybersecurity challenges in te...
Last week
About Scams
Cybercrime reports drop in NZ, but threats persist
Last week
About Virtual Private Network
Seraphic Security & Acora join forces to enhance browse...
This month
About Malware
Singtel's SingVerify to tackle scams, boost digital sec...
This month
About Email
eCommerce retailers at risk due to new email security r...
This month
Even more news
About Identity Theft
SEON report warns of complex fraud challenges ahead in ...
This month
About Piracy
Are C-suite executives cybersecurity's weakest link?
This month
About Malware
36m AI & gaming credentials breached, Kaspersky reveals
Last month
About Bring Your Own Device
Jamf report highlights poor cyber hygiene in organisati...
Last month
About Malware
VietCredCare cyber threat rocks Vietnam's social media ...
Last month
Other guides
You can read other related guides from Email Security, Cybersecurity, Breach Prevention, Malware, and Firewall.
Powered by