The Ultimate Guide to Phishing
2024 edition
Overview
Generally associated with unsolicited emails sent by a hacker to a wide range of targets, phishing is a ‘bait and switch’ tactic designed to trick targets into revealing personal information such as passwords or credit card details. The phishing email purports to be from a known party such as a bank or a colleague and requests a response which can include redirection to a spoof website where (for example) the target is encouraged to bank usernames or passwords. Phishing is a form of social engineering.
Analyst reports
Osterman Research on Advanced Persistent Threat Protection
Report: 80% of critical infrastructure hit by email bre...
Last month
Gartner on Email Security
Arctic Wolf enhances identity protection with new ITDR ...
Thu, 13th Jun 2024
IDC on Malware
Check Point launches Quantum Spark to boost cybersecuri...
Fri, 2nd Feb 2024
IDC on Malware
Fortinet report reveals cyber threats & defence gaps in...
Fri, 2nd Feb 2024
Gartner on Cloud Security
2024 to witness renewed focus on cyber resilience
Wed, 20th Dec 2023
Expert columns
By Matt Caffrey of Barracuda
Why you need layered email security to protect against ...
2 days ago
By Stephen Kho of Avast
Protect your mini-me: How to prevent child identity the...
2 days ago
By Matthew Salier of Australian Cyber Collaboration Centre
How we can help younger Australians tackle cybersecurit...
5 days ago
By Derek Manky of Fortinet
As attackers embrace artificial intelligence, every org...
Last week
By Mark Knowles of Xero
Four tips to protect your business from cybercriminals
Last month
Interviews
Discussing Shadow IT
Okta's redrawing its cybersecurity boundaries, says CSO
Yesterday
Discussing Ransomware
Exclusive: Mandiant Consulting highlights evolving cybe...
Last week
Discussing EduTech
Exclusive: Why creating phishing-resistant users is key...
Thu, 4th Jul 2024
Discussing Software-as-a-Service
Exclusive: How Katana is supporting Paralympics New Zea...
Tue, 4th Jun 2024
More expert columns
By Innes Muir of Logpoint
How MDR will transform cybersecurity in the mid-market
Last month
By Crispin Kerr of Proofpoint
GenAI: A new era of social engineering threats for Aust...
Last month
By Talent International
The impact of digital transformation on the financial s...
Fri, 16th Aug 2024
By Janine Morris of AvePoint
Strengthening an organisations cybersecurity posture in...
Fri, 9th Aug 2024
By Stephen Kho of Avast
You’re telling me that ad was fake? Malvertising is sne...
Thu, 8th Aug 2024
By Ashley Diffey of Ping Identity
How healthcare providers can tighten security using ide...
Thu, 11th Jul 2024
Top players
You can read more from the top players KnowBe4, 2degrees, Barracuda Networks, Check Point Software, and Google.
Recent news
About Ransomware
Zscaler report reveals rise in global ransomware attack...
Yesterday
About Social Media
Identity theft affects 13% of Australians, says Norton
2 days ago
About Cloud Services
Businesses paying ransomware ransoms doubles in 2024
3 days ago
About Collaboration
Microsoft warns of AI-driven cyber threats & ransomware...
3 days ago
About Software Updates
WatchGuard reveals Q2 2024 cyber threat trends report
3 days ago
More news
About Ransomware
Gap in cyber preparedness between Australia, UK, & US
3 days ago
About Data Protection
UK firms double encryption policy use in 2024 study fin...
3 days ago
About Ransomware
Akamai reveals cybercrime's impact on UK mental health
3 days ago
About Ransomware
OpenText survey: rise in software supply chain attacks
3 days ago
About EduTech
Bitdefender launches AI platform to tackle online scams
3 days ago
Even more news
About Malware
WatchGuard reveals new malware trends in Q2 2024 report
3 days ago
About Malware
Australian firms urged to bolster defences against AI r...
5 days ago
About Firewalls
Survey reveals CISO job anxiety amid security concerns
Last week
About Hate speech
Pillar Security reveals critical GenAI vulnerability ri...
Last week
About EduTech
Education remains a target for cyberattacks says Micros...
Last week
Other guides
You can read other related guides from Email Security, Cybersecurity, Breach Prevention, Malware, and Firewalls.
Powered by