The Ultimate Guide to Phishing
2025 edition
Overview
Generally associated with unsolicited emails sent by a hacker to a wide range of targets, phishing is a ‘bait and switch’ tactic designed to trick targets into revealing personal information such as passwords or credit card details. The phishing email purports to be from a known party such as a bank or a colleague and requests a response which can include redirection to a spoof website where (for example) the target is encouraged to bank usernames or passwords. Phishing is a form of social engineering.
Analyst reports

Gartner on Advanced Persistent Threat Protection
Exclusive: SquareX aims to redefine cybersecurity with ...
Last month

IDC MarketScape on Malware
Sophos MDR services protect 26,000 organisations global...
Tue, 14th Jan 2025

Gartner on Advanced Persistent Threat Protection
Trend Micro named leader in Gartner email security revi...
Mon, 30th Dec 2024

Osterman Research on Advanced Persistent Threat Protection
Report: 80% of critical infrastructure hit by email bre...
Thu, 19th Sep 2024

Gartner on Email Security
Arctic Wolf enhances identity protection with new ITDR ...
Thu, 13th Jun 2024
Expert columns

By Bob Gilbert of Netskope
Bad AI, good AI: harnessing AI for a stronger security ...
Last week

By Matt Caffrey of Barracuda Networks
Why email security needs automated incident response
Last month

By Jason Whyte of Trustwave
How to outsmart ransomware and build resilience within ...
Last month

By Johan Fantenberg of Ping Identity
How A Passwordless Future Can Become A Reality
Thu, 30th Jan 2025

By Yubico
Cybersecurity in 2025: Insights and predictions from Yu...
Thu, 16th Jan 2025
Interviews

Discussing Malware
Exclusive: Infoblox reveals the importance of DNS secur...
Last month

Discussing Firewalls
Exclusive: Radware SVP Travis Volk discusses evolving c...
Tue, 10th Dec 2024

Discussing Collaboration
Exclusive: Qualys MD discusses cybersecurity in ANZ reg...
Wed, 4th Dec 2024

Discussing Digital Transformation
CyberArk highlights new security threats at Impact Worl...
Fri, 25th Oct 2024

Discussing Firewalls
Okta's redrawing its cybersecurity boundaries, says CSO
Fri, 18th Oct 2024
More expert columns

By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Tue, 17th Dec 2024

By Sneha Banerjee of ManageEngine
Sneaky scams to watch for this holiday season (and how ...
Fri, 13th Dec 2024

By Curtis Raams of Prvidr
Countering the security threat from within
Thu, 12th Dec 2024

By Matt Caffrey of Barracuda ANZ
The top cybersecurity predictions for businesses in 202...
Wed, 11th Dec 2024

By Derek Manky of Fortinet
Threat predictions for 2025: Get ready for bigger, bold...
Fri, 29th Nov 2024

By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024
Recent news

About Malware
Microsoft exposes phishing scam targeting Booking.com h...
Today

About Malware
Australian downtime costs climb to AUD $86 billion annu...
Yesterday

About Ransomware
KnowBe4's global report finds rising cyber threats aime...
4 days ago

About Malware
Dark web leak: 2.3 million bank cards exposed online
Last week

About Endpoint Protection
Trojan banker attacks on Android rise 196% in 2024
Last week
More news

About Ransomware
Cyber threats in Australian firms prompt zero trust shi...
Last week

About Firewalls
ReliaQuest report reveals rapid evolution in cyber thre...
Last month

About Malware
Cybercrime report reveals 58% surge in APT activity
Last month

About Cloud Services
Kaspersky uncovers malware attack in Asia-Pacific regio...
Last month

About Firewalls
Cyber report warns of AI-driven threats & quicker attac...
Last month
Even more news

About IT Training
Australian IT leaders struggle to identify scam emails
Last month

About Social Media
KnowBe4 report highlights impact of workplace training
Last month

About Firewalls
Fortinet achieves IRAP assessment on Google Cloud platf...
Last month

About Cyber Threats
Email security gaps leave Asia Pacific firms vulnerable
Last month

About Ransomware
NormCyber to host cyber event for Yorkshire businesses
Last month
Other guides
You can read other related guides from Email Security, Cybersecurity, Breach Prevention, Advanced Persistent Threat Protection, and Artificial Intelligence.
Powered by