The Ultimate Guide to Phishing
2025 edition
Overview
Generally associated with unsolicited emails sent by a hacker to a wide range of targets, phishing is a ‘bait and switch’ tactic designed to trick targets into revealing personal information such as passwords or credit card details. The phishing email purports to be from a known party such as a bank or a colleague and requests a response which can include redirection to a spoof website where (for example) the target is encouraged to bank usernames or passwords. Phishing is a form of social engineering.
Analyst reports

Gartner on Malware
Why is ransomware still a thing in 2025?
Last month

AV-TEST on DevOps
Kaspersky tops 2024 security tests with record 97% TOP3...
Thu, 17th Apr 2025

Gartner on SaaS
Palo Alto Networks invests in Asia-Pacific cloud securi...
Fri, 28th Mar 2025

Gartner on Malware
AI to halve time needed for account takeover by 2027
Wed, 19th Mar 2025

Gartner on Advanced Persistent Threat Protection
Exclusive: SquareX aims to redefine cybersecurity with ...
Thu, 27th Feb 2025
Expert columns

By Robert Falzon of Check Point Software Canada
How AI is Reshaping the Cyber Threat Landscape
Last week

By Erich Kron of KnowBe4
Malicious memes: How cybercriminals use humour to sprea...
Last month

By Jamie Humphrey of Dell Technologies Australia & New Zealand
The Ransomware Threat: How to respond and protect your ...
Last month

By Gareth Cox of Exabeam
How businesses are fighting sophisticated cyber threats...
Last month

By Victoria Boryaeva of Pulseway
Essential Eight: Full cyber resilience through complian...
Mon, 28th Apr 2025
Interviews

Discussing Cloud Services
Exclusive: Why every day should be World Backup Day
Wed, 2nd Apr 2025

Discussing Multi-factor authentication
Exclusive: Yubico pushes for wider protection under Aus...
Mon, 31st Mar 2025

Discussing Malware
Exclusive: Infoblox reveals the importance of DNS secur...
Fri, 21st Feb 2025

Discussing Firewalls
Exclusive: Radware SVP Travis Volk discusses evolving c...
Tue, 10th Dec 2024

Discussing Collaboration
Exclusive: Qualys MD discusses cybersecurity in ANZ reg...
Wed, 4th Dec 2024
More expert columns

By Rakesh Prabhakar of Zoho
How can small and medium businesses safeguard against r...
Thu, 17th Apr 2025

By Dakshitaa Babu of SquareX
Why ClickFix attacks are outpacing enterprise security
Fri, 21st Mar 2025

By Jack Meltzer of Gallagher Security
Building a culture of cyber hygiene
Tue, 18th Mar 2025

By Bob Gilbert of Netskope
Bad AI, good AI: harnessing AI for a stronger security ...
Mon, 3rd Mar 2025

By Matt Caffrey of Barracuda Networks
Why email security needs automated incident response
Fri, 21st Feb 2025

By Jason Whyte of Trustwave
How to outsmart ransomware and build resilience within ...
Wed, 12th Feb 2025
Recent news

About Managed Services
Infinigate secures Keepnet xHRM rights to counter vishi...
Today

About Cybercrime
Most high-traffic email domains still vulnerable to phi...
Last week

About Identity Theft
AI-driven cyber scams surge as phishing & fake updates ...
Last week

About Malware
AI-fuelled scams & phishing soar in New Zealand, says G...
Last week

About Ransomware
AI-powered ransomware surge despite fewer ransoms paid
Last week
More news

About Malware
Fake AI social media ads spread malware to millions glo...
Last week

About Malware
US charges Russian in Qakbot cybercrime, seizes USD $24...
Last week

About Ransomware
US government face surge in cyberattacks amid budget cu...
Last week

About Digital Literacy
Singapore could gain SGD $53 billion from AI productivi...
Last week

About Hackers
Phishing attacks exploit AppSheet to mimic Meta & evade...
Last month
Even more news

About Malware
Organisations boost AI security as data threats & risks...
Last month

About Software Updates
Cloudflare, Microsoft & police disrupt global malware s...
Last month

About Ransomware
Ransomware attacks on industrial targets surge, AI tact...
Last month

About Cybercrime
McAfee rolls out AI scam detector for Australians amid ...
Last month

About Malware
Organisations prioritise AI security as GenAI adoption ...
Last month
Other guides
You can read other related guides from Email Security, Cybersecurity, Breach Prevention, Advanced Persistent Threat Protection, and Artificial Intelligence.
Powered by