Security News > 2020 > March > What is the Best Defense Against Phishing Attacks?

Phishing is typically used to gain credentials so attackers have access to an organization's systems, or as a way to deploy malware directly.
One of the key reasons phishing is so successful is how easy it is to execute, and how many ways it can be used.
With the advent of the dark web, nearly anyone can purchase a turnkey phishing kit, and be well on their way to launching their first attack within minutes.
Phishing simulations allow organizations to find out who is vulnerable by launching a safe phishing campaign, deploying emails that are of varying degrees of difficulty.
How do you get started with a social engineering pen test? Just as threat actors can find instructions to launch a phishing attack online, there are luckily plenty of resources for those looking to learn how to successfully create and execute their own ethical campaign, like the Best Practices for Effective Phishing Simulations eCourse.
News URL
Related news
- Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks (source)
- iOS devices face twice the phishing attacks of Android (source)
- 41% of Attacks Bypass Defenses: Adversarial Exposure Validation Fixes That (source)
- Windows NTLM hash leak flaw exploited in phishing attacks on governments (source)
- Three Reasons Why the Browser is Best for Stopping Phishing Attacks (source)
- Phishing detection is broken: Why most attacks feel like a zero day (source)
- DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack (source)
- Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense (source)
- Low-tech phishing attacks are gaining ground (source)
- MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks (source)