The Ultimate Guide to Phishing
2024 edition
Overview
Generally associated with unsolicited emails sent by a hacker to a wide range of targets, phishing is a ‘bait and switch’ tactic designed to trick targets into revealing personal information such as passwords or credit card details. The phishing email purports to be from a known party such as a bank or a colleague and requests a response which can include redirection to a spoof website where (for example) the target is encouraged to bank usernames or passwords. Phishing is a form of social engineering.
Analyst reports
Osterman Research on Advanced Persistent Threat Protection
Report: 80% of critical infrastructure hit by email bre...
Thu, 19th Sep 2024
Gartner on Email Security
Arctic Wolf enhances identity protection with new ITDR ...
Thu, 13th Jun 2024
IDC on Malware
Check Point launches Quantum Spark to boost cybersecuri...
Fri, 2nd Feb 2024
IDC on Malware
Fortinet report reveals cyber threats & defence gaps in...
Fri, 2nd Feb 2024
Gartner on Cloud Security
2024 to witness renewed focus on cyber resilience
Wed, 20th Dec 2023
Expert columns
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Last week
By COSBOA
Join the fight against cyber crime: Enrol in Cyber Ward...
This month
By Matt Caffrey of Barracuda
Why you need layered email security to protect against ...
Last month
By Stephen Kho of Avast
Protect your mini-me: How to prevent child identity the...
Last month
By Matthew Salier of Australian Cyber Collaboration Centre
How we can help younger Australians tackle cybersecurit...
Last month
Interviews
Discussing Digital Transformation
CyberArk highlights new security threats at Impact Worl...
Last month
Discussing Firewalls
Okta's redrawing its cybersecurity boundaries, says CSO
Last month
Discussing Ransomware
Exclusive: Mandiant Consulting highlights evolving cybe...
Last month
Discussing EduTech
Exclusive: Why creating phishing-resistant users is key...
Thu, 4th Jul 2024
Discussing Software-as-a-Service
Exclusive: How Katana is supporting Paralympics New Zea...
Tue, 4th Jun 2024
More expert columns
By Derek Manky of Fortinet
As attackers embrace artificial intelligence, every org...
Last month
By Mark Knowles of Xero
Four tips to protect your business from cybercriminals
Wed, 18th Sep 2024
By Innes Muir of Logpoint
How MDR will transform cybersecurity in the mid-market
Mon, 16th Sep 2024
By Crispin Kerr of Proofpoint
GenAI: A new era of social engineering threats for Aust...
Tue, 3rd Sep 2024
By Talent International
The impact of digital transformation on the financial s...
Fri, 16th Aug 2024
By Janine Morris of AvePoint
Strengthening an organisations cybersecurity posture in...
Fri, 9th Aug 2024
Top players
Recent news
About Malware
Sextortion scams surge with personal data to extort mon...
Today
About Security Information and Event Management
Tesserent warns AI will fuel cyber threats by 2025
Last week
About EduTech
Social media scams cost Australian children AUD $129,70...
Last week
About Ransomware
Google Cloud warns of AI escalation in cyber threats by...
Last week
About Firewalls
Experts urge vigilance against growing digital fraud ri...
Last week
More news
About Malware
Kaspersky aids INTERPOL in disrupting global cybercrime
Last week
About Small Business
Guardz survey reveals MSP challenges in cybersecurity
Last week
About IT services
Rising demand drives cybersecurity revenue growth surge
This month
About Cloud Services
EasyDMARC integrates with Pax8 for enhanced email secur...
This month
About Malware
North Korean hackers target cryptocurrency with malware
This month
Even more news
About Malware
ReliaQuest warns of ongoing threat from credential abus...
This month
About Interactive learning
Meta1st launches AI platform to tackle cyber threats
This month
About Software-as-a-Service
Canadian & Turkish authorities arrest cybercriminal duo
This month
About Data Protection
UK councils lack cyber insurance, Apricorn report finds
This month
About Data Protection
SafeGuardian expands to New Zealand with cyber services
This month
Other guides
You can read other related guides from Email Security, Cybersecurity, Breach Prevention, Malware, and Advanced Persistent Threat Protection.
Powered by