- Legitimate file-sharing sites
- Fake Office 365 websites
- Spoofed executive emails
- The baseStriker vulnerability
4 Trending Phishing Techniques: Real-Life Examples and Tips for Detection
Posted on | Featured | No Comments
Many successful attacks begin with a phishing email that some user falls for. And that’s why MITRE prominently features Spearphishing (T1192) as an Initial Access technique in ATT&CK. View the on-demand webinar with Ultimate Windows Security to learn about the latest phishing techniques used by attackers and how MITRE ATT&CK can help detect and remediate these threats. We’ll show you actual examples of phishing attempts executed through:
Watch now to learn more. And for more details on detecting phishing, read the white paper.