![]() |
How cybercriminals harvest information for spear phishing - Printable Version +- Geeks for your information (https://www.geeks.fyi) +-- Forum: Security (https://www.geeks.fyi/forumdisplay.php?fid=68) +--- Forum: Security Vendors (https://www.geeks.fyi/forumdisplay.php?fid=87) +---- Forum: Kaspersky (https://www.geeks.fyi/forumdisplay.php?fid=90) +----- Forum: Kaspersky Security Blog (https://www.geeks.fyi/forumdisplay.php?fid=142) +----- Thread: How cybercriminals harvest information for spear phishing (/showthread.php?tid=5599) |
How cybercriminals harvest information for spear phishing - harlan4096 - 12 February 19 ![]() Quote:In analyzing targeted attacks over the past decade, we continually find a recurring theme: “It all started when the victim opened a phishing e-mail.” Why are spear-phishing e-mails so effective? It’s because they are contextualized and tailored to the specific victim.Full reading: https://www.kaspersky.com/blog/spearphishers-information/25589/ |