4 Trending Phishing Techniques: Real-Life Examples and Tips for Detection

Many successful attacks begin with a phishing email that some user falls for. And that’s why MITRE prominently features Spearphishing (T1192) as an Initial Access technique in ATT&CK. View the on-demand webinar with Ultimate Windows Security to learn about the latest phishing techniques used by attackers and how MITRE ATT&CK can help detect and remediate these threats. We’ll show you actual examples of phishing attempts executed through:
  • Legitimate file-sharing sites
  • Fake Office 365 websites
  • Spoofed executive emails
  • The baseStriker vulnerability
Watch now to learn more. And for more details on detecting phishing, read the white paper.