Storyline
Voice phishing surges as attackers speed up tactics and insider threats rise
In 2025, cyber attackers accelerated their operations and shifted tactics, with voice phishing emerging as the second most common initial access vector after exploits.
Evidence locked
Today's free sample is only available for the edition's flagship storyline.
Evidence preview
- Mandiant M-Trends 2026 report at RSA Conferencecsoonline.com
- CyberScoop coverage of Mandiant report on voice phishing surgecyberscoop.com
- The Register Security on voice phishing risego.theregister.com
- Check Point Research 23rd March Threat Intelligence Reportresearch.checkpoint.com