About 942,000 results
Open links in new tab
  1. Phishing - Cyber.gov.au

    Mar 19, 2023 · What is phishing? Phishing is a way cybercriminals trick you into giving them personal information. They send you fraudulent emails or text messages often pretending to …

  2. What is phishing? | Phishing attack prevention | Cloudflare

    Phishing attack methods trick people into sharing sensitive data. Learn how to prevent phishing, spot common scams, and protect your organization.

  3. What is phishing? - IBM

    Nov 4, 2017 · Phishing is a type of cyberattack that uses fraudulent emails, text messages, phone calls or websites to trick people into sharing sensitive data, downloading malware or otherwise …

  4. Phishing - Wikipedia

    Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information [1] or installing malware such as viruses, worms, adware, or ransomware.

  5. What is Phishing? Techniques and Prevention | CrowdStrike

    What is a phishing attack? Phishing is a type of cyberattack where threat actors masquerade as legitimate companies or individuals to steal sensitive information such as usernames, …

  6. What is phishing: recognize and avoid phishing scams

    Discover what phishing is, how it works, and how to protect yourself. Our easy-to-read guide helps you stay safe online with practical tips.

  7. Phishing: How it works and how to help protect yourself | ANZ

    Phishing is designed to look convincing and prompt quick action. We’re going to take you through what phishing is, how it works, and ways to help you protect your personal and financial …

  8. Phishing | vic.gov.au

    Learn about what phishing is, the warning signs and how to protect yourself from phishing scams or attacks.

  9. Phishing Attacks: Types, Statistics, and Prevention - Varonis

    Dec 16, 2025 · Discover the latest phishing attack types, key statistics, and proven prevention strategies to protect organizations across email, messaging apps, and collaboration platforms. …

  10. Phishing Attacks Australia in 2025: How to Spot and Stop Cyber …

    Mar 14, 2025 · In this guide, we’ll uncover the latest phishing techniques, show you how they’ve evolved in 2025, and provide actionable steps to keep your data safe. Let’s dive in! Gone are …

  11. Understanding and Preventing Phishing Attacks - United States ...

    May 21, 2025 · What is Phishing? Phishing is a type of cyber-attack where cybercriminals attack you through social engineering, which involves deceptive communications designed to gain …

  12. 12 Most Common Phishing Attacks With Examples - Learn Hub

    Aug 1, 2025 · To combat these next-gen threats, companies are turning to advanced cloud email security solutions built to detect and defuse sophisticated phishing attacks. This article will …

  13. What Is Phishing? - Palo Alto Networks

    Phishing is a form of social engineering that uses deception to manipulate individuals into disclosing sensitive information or executing unauthorized transactions.

  14. What is phishing? Examples, types, and techniques - CSO Online

    Phishing is a type of social engineering attack where criminals use fraudulent communication to trick people into revealing sensitive data. Common phishing techniques include deceptive …

  15. What Is Phishing? Examples and Phishing Quiz - Cisco

    Phishing is the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging. The attacker's …

  16. What Is a Phishing Attack? Types and Prevention Methods

    Oct 15, 2025 · Phishing attacks are the most prevalent digital threat for individuals and businesses today. Cybercriminals use various tactics to trick victims into sharing sensitive …

  17. Phishing Attacks and How to Protect Against Them

    Phishing is a type of scam. It involves scammers sending communication (usually email but may also be a phone call or SMS) disguised as being from a trusted sender in order to steal …

  18. What is Phishing? Types, Risks, and Protection Strategies

    A phishing cyber attack targets users directly through email, text, or direct messages. Learn how phishing works, tips to spot & protect organizations against phishing scams.

  19. AI Phishing: How It Works, 4 Types of Attacks & Defensive …

    2 days ago · AI phishing uses artificial intelligence to create more sophisticated and convincing scams, such as personalized emails, realistic voice clones, and deepfake videos. These …

  20. What Is Phishing and How To Avoid It

    Phishing is when cybercriminals use emails, social media posts, or direct messages to trick you into clicking harmful links or downloading malicious files. Phishing is a common "social …

  21. What happens when a cybersecurity company gets phished?

    Sep 22, 2025 · If you work in cybersecurity, you’ve probably heard the time-honored adage about cyber attacks: “It’s not a matter of if, but when.” Perhaps a better way to think of it is this: while …

  22. What Is Phishing? | Microsoft Security

    Phishing attacks aim to steal or damage sensitive data by deceiving people into revealing personal information like passwords and credit card numbers. Phishing is a type of cyberattack …

  23. Microsoft 365 accounts targeted in wave of OAuth phishing attacks

    Dec 19, 2025 · Multiple threat actors are compromising Microsoft 365 accounts in phishing attacks that leverage the OAuth device code authorization mechanism.

  24. Warning issued as surge in OAuth device code phishing leads to …

    Dec 22, 2025 · Home Security Phishing Warning issued as surge in OAuth device code phishing leads to M365 account takeovers Successful attacks enable full M365 account access, …

  25. Cyberattack - Wikipedia

    A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. [1] …

  26. Russia-Linked Hackers Use Microsoft 365 Device Code Phishing

    Dec 19, 2025 · A Russia-aligned threat group uses Microsoft 365 device code phishing to steal credentials and take over accounts, tracked since September 2025.

  27. What is an attack vector? - IBM

    An attack vector is a pathway or method through which hackers gain unauthorized access to target systems to commit a cyberattack.