14 Types of Phish and How to Defend Against Them

Logo
Presented by

Carl Leonard, Cybersecurity Strategist / Davide Canali, Sr Threat Research Manager

About this talk

Phishing isn’t just about clumsy emails from far-away princes needing your help to unlock their fortune! It’s a sophisticated game played by cybercriminals who’ve mastered the art of deception. Join our cybersecurity experts as they uncover with real examples the 14 most cunning types of phishing attacks that threaten organisations in EMEA: * BEC (Business Email Compromise): the silent assassin that infiltrates your inbox, masquerading as a trusted colleague or executive. Learn how to spot the wolf in sheep’s clothing. * Smishing (SMS Phishing): discover how cyber crooks manipulate your phone to steal your secrets. * TOAD Attacks (Telephone-Oriented Attack Delivery): ever felt like your device had a mind of its own? We’ll expose the dark magic behind TOAD attacks. * Spear Phishing: the personalised strike! Understand how cyber adversaries tailor their bait just for you. …and 10 more! Unlock the secrets of phishing defence. Join us on this exclusive webinar.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (775)
Subscribers (80383)
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.