How to stay safe from cybercriminal “quishing” attacks | TechRadar

Phishing works so well because it relies on hacking the human psyche. We want to trust the stories we’re told – especially if they’re told by ostensibly trustworthy organizations or individuals. This is an admirable, but highly exploitable, trait. As technologies evolve, threat actors are continually refining the methods they use to take advantage of trusting end-users.

The evolution of phishing: vishing & quishing | TechRadar

The reconnaissance phase at the beginning of an attack plays an even more important role in the defense strategy. 

Don’t overlook the security risk posed by QR codes | TechRadar

But the more mainstream the technology has become, the more attractive it has become for threat actors. The same accessibility that makes the QR code a useful tool also makes it an effective vector for phishing and malware delivery.

Beware Of Malicious PDF Files That Mimic As Microsoft 2FA Security Update

Phishing attacks are evolving to use QR codes to trick users into entering their credentials on malicious websites, which can be designed to look like legitimate login pages and may even prefill the username field to increase believability. 

Hackers Using Weaponized Docs In QR Code Phishing Attacks

Threat actors embed malicious QR codes in emails, documents, and public places, using them to mask destinations. 

Phishing statistics that will make you think twice before clicking – Help Net Security

This article includes excerpts from various reports that offer statistics and insights into the current phishing landscape.