Security News > 2020 > March > What is the Best Defense Against Phishing Attacks?
Phishing is typically used to gain credentials so attackers have access to an organization's systems, or as a way to deploy malware directly.
One of the key reasons phishing is so successful is how easy it is to execute, and how many ways it can be used.
With the advent of the dark web, nearly anyone can purchase a turnkey phishing kit, and be well on their way to launching their first attack within minutes.
Phishing simulations allow organizations to find out who is vulnerable by launching a safe phishing campaign, deploying emails that are of varying degrees of difficulty.
How do you get started with a social engineering pen test? Just as threat actors can find instructions to launch a phishing attack online, there are luckily plenty of resources for those looking to learn how to successfully create and execute their own ethical campaign, like the Best Practices for Effective Phishing Simulations eCourse.
News URL
Related news
- CERT-UA Warns of Phishing Attacks Targeting Ukraine’s Defense and Security Force (source)
- Phishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacks (source)
- GenAI makes phishing attacks more believable and cost-effective (source)
- Inside the incident: Uncovering an advanced phishing attack (source)
- Microsoft enforces defenses preventing NTLM relay attacks (source)
- Ongoing phishing attack abuses Google Calendar to bypass spam filters (source)