Cybersecurity Glossary

What is Phishing?

Phishing is a social engineering attack in which adversaries send deceptive emails, messages, or create fraudulent websites designed to trick recipients into revealing sensitive information, clicking malicious links, or downloading malware.

Phishing explained

Phishing attacks range from broad, untargeted campaigns that blast generic lures to thousands of recipients, to highly personalized spear-phishing messages crafted for specific individuals using information gathered from social media, company websites, and data breaches. Spear phishing directed at senior executives is known as "whaling" and often involves sophisticated impersonation of trusted business contacts. Common phishing techniques include credential-harvesting pages that mimic legitimate login portals, malicious attachments disguised as invoices or shipping notifications, and urgent requests that create pressure to act without verifying. Attackers increasingly use legitimate cloud services like Google Docs, Microsoft OneDrive, and Dropbox to host phishing content, making it harder for email filters to detect malicious links. The success of phishing relies on human psychology rather than technical exploits. Urgency, authority, fear, and curiosity are the primary emotional levers attackers pull. Even well-trained employees can be deceived by a sophisticated phishing attempt, which is why technical controls like email authentication (SPF, DKIM, DMARC), URL filtering, and multi-factor authentication are essential complementary defenses.

Why It Matters

Why phishing matters for your business

Phishing is the number one initial access vector for cyberattacks against businesses of all sizes, and SMBs are especially vulnerable. Smaller organizations often lack dedicated email security gateways, have limited security awareness training programs, and rely heavily on email for daily operations. A single successful phishing email can lead to ransomware deployment, business email compromise, data theft, or financial fraud. The direct costs of a phishing-related breach include incident response, legal counsel, customer notification, and potential regulatory fines. Indirect costs such as lost productivity, damaged client relationships, and reputational harm can persist for months or years. Building a defense-in-depth approach that combines technical controls with ongoing employee education is the most effective strategy against phishing.

How Cyber Defense Agent Helps

Phishing and Cyber Defense Agent

Cyber Defense Agent scans your domain's email authentication records, identifies spoofing vulnerabilities, and assesses your exposure to phishing attacks. The platform checks SPF, DKIM, and DMARC configurations to ensure attackers cannot easily impersonate your domain, and it provides clear guidance on closing gaps that phishing operators commonly exploit.

Get your Cyber Defense Score™ in 60 seconds.

100 tools. No installation. No credit card.

Get My Cyber Defense Score™ →