Threat IntelligenceAlso called: "phishing attack", "email phishing", "credential phishing"
Phishing exploits human psychology to bypass technical security controls, making it one of the most effective attack vectors.
Common phishing techniques
- Email phishing: Mass campaigns impersonating trusted brands (banks, IT support, delivery services).
- Spear phishing: Targeted attacks using researched information about specific individuals or organizations.
- Whaling: High-value attacks targeting executives and decision-makers.
- Smishing: Phishing via SMS text messages with malicious links.
- Vishing: Voice phishing using phone calls to extract information or credentials.
- Clone phishing: Duplicating legitimate emails with malicious links or attachments swapped in.
Red flags to watch for
- Urgent language pressuring immediate action.
- Requests for credentials, payment, or sensitive data.
- Suspicious sender addresses that mimic legitimate domains.
- Unexpected attachments or unfamiliar link destinations.
- Generic greetings instead of personalized names.
- Poor grammar, spelling errors, or awkward phrasing.
How to prevent phishing
- Implement email authentication (SPF, DKIM, DMARC) to block spoofed senders.
- Deploy advanced email filtering with link and attachment sandboxing.
- Train employees regularly with simulated phishing campaigns.
- Require multi-factor authentication (MFA) to limit credential theft impact.
- Use password managers to prevent credential entry on fake sites.
- Establish out-of-band verification for sensitive requests (call back using known numbers).
- Report and analyze phishing attempts to improve defenses.
Explore More Threat Intelligence
View all termsIP Reputation
A trustworthiness score assigned to IP addresses based on observed behavior, used to identify malicious traffic.
Read more →Malware
Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems and data.
Read more →Threat Intelligence
Evidence-based knowledge about existing or emerging threats used to inform security decisions and response.
Read more →URL/Domain Defanging
A technique to render URLs and IPs non-clickable by replacing characters, preventing accidental access to malicious sites.
Read more →