Storyline

Voice phishing surges as attackers speed up tactics and insider threats rise

In 2025, cyber attackers accelerated their operations and shifted tactics, with voice phishing emerging as the second most common initial access vector after exploits.

Evidence locked
Today's free sample is only available for the edition's flagship storyline.
Evidence preview
  • Mandiant M-Trends 2026 report at RSA Conference
    csoonline.com
  • CyberScoop coverage of Mandiant report on voice phishing surge
    cyberscoop.com
  • The Register Security on voice phishing rise
    go.theregister.com
  • Check Point Research 23rd March Threat Intelligence Report
    research.checkpoint.com