What is Phishing?

  • May 24, 2019

Most of us have probably heard about cyber adversaries using methods such as Phishing, Spear-Phishing, Whaling, Pharming, Drive by Downloads and Watering Holes creative ways to steal users credentials.

These cleverly named attacks have been around for years but are still one of the most successful methods used to gain access to your network.