Signal

Voice phishing surges as insider threats and faster attacks reshape cyber risk landscape

Evidence first: scan the strongest sources, then decide whether to go deeper.

Published 2026-03-23 07:00 UTCUpdated 2026-03-23 15:42 UTC
rss
threat_actorsbreachessocial_engineeringinsider_threatsincident_responsesecurity_policy
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (4 domains)domains are deduped. counts indicate coverage, not truth.
4 top sources shown
The phone call is the new phishing email
CyberScoop · News · cyberscoop.com · 2026-03-23 15:00 UTC
23rd March – Threat Intelligence Report
Check Point Research · News · research.checkpoint.com · 2026-03-23 13:38 UTC
Overview

In 2025, cyber attackers accelerated their operations and shifted tactics, with voice phishing emerging as the second most common initial access vector after exploits.

Score total
1.42
Momentum 24h
5
Posts
5
Origins
4
Source types
1
Duplicate ratio
0%
Why now
  • 2025 data shows a marked increase in voice phishing and insider incidents, reflecting evolving attacker strategies.
  • Recent major breaches highlight ongoing exposure of sensitive data despite existing defenses.
  • Reports released at the 2026 RSA Conference and recent threat intelligence bulletins provide fresh insights into current threat trends.
Why it matters
  • Voice phishing's rise signals attackers are adopting more sophisticated social engineering to bypass defenses.
  • Insider threats are resurging, posing significant financial and data loss risks to organizations.
  • Faster, more collaborative attacks targeting recovery systems complicate incident response and recovery efforts.
LLM analysis
Topic mix: lowPromo risk: lowSource quality: high
Recurring claims
  • Voice phishing accounted for 11% of initial infection vectors in 2025, becoming the second most common entry point after exploits.
  • Insider threats have increased, with 42% of organizations reporting more malicious and negligent insider incidents, costing an average of $13.1 million per incident.
  • Attackers are operating faster and more collaboratively, compressing key phases of the attack lifecycle while median dwell time increased to 14 days.
How sources frame it
  • Mandiant: neutral
This narrative synthesizes multiple recent reports highlighting the rise of voice phishing and insider threats as key evolving risks in the 2025 cyber threat landscape.
All evidence
All evidence
Faster attacks and ‘recovery denial’ ransomware reshape threat landscape
CSO Online · csoonline.com · 2026-03-23 15:42 UTC
Smooth criminals talking their way into cloud environments, Google says
The Register Security · go.theregister.com · 2026-03-23 15:00 UTC
The phone call is the new phishing email
CyberScoop · cyberscoop.com · 2026-03-23 15:00 UTC
23rd March – Threat Intelligence Report
Check Point Research · research.checkpoint.com · 2026-03-23 13:38 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 4Origin domains: 4Duplicates: -
Showing 4 / 0
Top publishers (this list)
  • CSO Online (1)
  • The Register Security (1)
  • CyberScoop (1)
  • Check Point Research (1)
Top origin domains (this list)
  • csoonline.com (1)
  • go.theregister.com (1)
  • cyberscoop.com (1)
  • research.checkpoint.com (1)