When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

The reconnaissance phase at the beginning of an attack plays an even more important role in the defense strategy.

CISO EMEA at Zscaler.

A digital representation of a lock

Due to growing user awareness for traditional phishing campaigns, different channels and techniques are invented by the adversaries.

More recently, fake phone calls or vishing have gained popularity.

Used in conjunction with traditional phishing techniques, vishing becomes increasingly challenging for users to discern its legitimacy.

But it isnt just voice cloning - the latest evolution of phishing which will impact 2024 is Quishing.

This is where a QR-code is sent viaemailwith a malicious link hidden behind the image.

This makes it difficult to verify and is often missed by security tools.

This especially raises the risk for employees who use their own personalsmartphonedevices as most are not adequately protected.

Employees nowadays trust the available security solutions too much and dont exercise enough caution when receiving suspicious communications.

Before acting, the employee should look to authenticate that person.

As phishing is often just the beginning of the chain of compromise it should get more attention.

Businesses should be worried about the new capabilities of AI to uplevel phishing attacks.

We’ve listed the best identity management software.

The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.

If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro