{"id":99928,"date":"2023-11-08T15:02:45","date_gmt":"2023-11-08T15:02:45","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?post_type=resources&#038;p=99928"},"modified":"2023-11-08T15:04:05","modified_gmt":"2023-11-08T15:04:05","slug":"phishing-threat-trends-report","status":"publish","type":"resources","link":"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/","title":{"rendered":"Phishing Threat Trends Report"},"content":{"rendered":"\n<p>Cybercrime has never been more prominent and dangerous.<\/p>\n\n\n\n<p>The evolution of sophisticated phishing emails continues to pose a major threat to organizations, emphasizing the need to enhance defenses to prevent attacks. For cybersecurity leaders committed to protecting their organizations, staying informed about the latest phishing threats is paramount.<br><br><strong>In this report, Egress&#8217; VP of Threat Intelligence, Jack Chapman, examines the\u00a0top threat trends in email security\u00a0and offers a comprehensive strategy for organizations to\u00a0fortify their email security defenses<\/strong>. <strong>Complete the form to the right to download the report.<\/strong> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime has never been more prominent and dangerous. The evolution of sophisticated phishing emails continues to pose a major threat to organizations, emphasizing the need to enhance defenses to prevent attacks. For cybersecurity leaders committed to protecting their organizations, staying informed about the latest phishing threats is paramount. In this report, Egress&#8217; VP of Threat [&hellip;]<\/p>\n","protected":false},"author":56014,"featured_media":99929,"template":"","meta":{"_acf_changed":false},"categories":[3],"tags":[],"resource_type":[],"ppma_author":[895],"class_list":["post-99928","resources","type-resources","status-publish","has-post-thumbnail","hentry","category-cloud-computing-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Resources | Phishing Threat Trends Report | Cloud Tech News<\/title>\n<meta name=\"description\" content=\"Access the Phishing Threat Trends Report powered by Egress exploring the top threat trends in email security and offers a comprehensive strategy to fortify email security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Threat Trends Report\" \/>\n<meta property=\"og:description\" content=\"Access the Phishing Threat Trends Report powered by Egress exploring the top threat trends in email security and offers a comprehensive strategy to fortify email security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloud Computing News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-08T15:04:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2023\/11\/phishing-trends-report.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"712\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/\",\"name\":\"Resources | Phishing Threat Trends Report | Cloud Tech News\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2023\/11\/phishing-trends-report.png\",\"datePublished\":\"2023-11-08T15:02:45+00:00\",\"dateModified\":\"2023-11-08T15:04:05+00:00\",\"description\":\"Access the Phishing Threat Trends Report powered by Egress exploring the top threat trends in email security and offers a comprehensive strategy to fortify email security\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/#primaryimage\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2023\/11\/phishing-trends-report.png\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2023\/11\/phishing-trends-report.png\",\"width\":1140,\"height\":712},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudcomputing-news.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.cloudcomputing-news.net\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Phishing Threat Trends Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"name\":\"Cloud Computing News\",\"description\":\"IaaS, SaaS, PaaS, Data Security, CIO, Analysis\",\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\",\"name\":\"Cloud Computing News\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"width\":1920,\"height\":1080,\"caption\":\"Cloud Computing News\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\",\"https:\/\/x.com\/cloud_comp_news\",\"https:\/\/www.linkedin.com\/groups\/45151\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Resources | Phishing Threat Trends Report | Cloud Tech News","description":"Access the Phishing Threat Trends Report powered by Egress exploring the top threat trends in email security and offers a comprehensive strategy to fortify email security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/","og_locale":"en_GB","og_type":"article","og_title":"Phishing Threat Trends Report","og_description":"Access the Phishing Threat Trends Report powered by Egress exploring the top threat trends in email security and offers a comprehensive strategy to fortify email security","og_url":"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/","og_site_name":"Cloud Computing News","article_publisher":"https:\/\/www.facebook.com\/pages\/CT\/210614738995040","article_modified_time":"2023-11-08T15:04:05+00:00","og_image":[{"width":1140,"height":712,"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2023\/11\/phishing-trends-report.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@cloud_comp_news","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/","url":"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/","name":"Resources | Phishing Threat Trends Report | Cloud Tech News","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2023\/11\/phishing-trends-report.png","datePublished":"2023-11-08T15:02:45+00:00","dateModified":"2023-11-08T15:04:05+00:00","description":"Access the Phishing Threat Trends Report powered by Egress exploring the top threat trends in email security and offers a comprehensive strategy to fortify email security","breadcrumb":{"@id":"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/#primaryimage","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2023\/11\/phishing-trends-report.png","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2023\/11\/phishing-trends-report.png","width":1140,"height":712},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudcomputing-news.net\/resources\/phishing-threat-trends-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudcomputing-news.net\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.cloudcomputing-news.net\/resources\/"},{"@type":"ListItem","position":3,"name":"Phishing Threat Trends Report"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudcomputing-news.net\/#website","url":"https:\/\/www.cloudcomputing-news.net\/","name":"Cloud Computing News","description":"IaaS, SaaS, PaaS, Data Security, CIO, Analysis","publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cloudcomputing-news.net\/#organization","name":"Cloud Computing News","url":"https:\/\/www.cloudcomputing-news.net\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","width":1920,"height":1080,"caption":"Cloud Computing News"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/CT\/210614738995040","https:\/\/x.com\/cloud_comp_news","https:\/\/www.linkedin.com\/groups\/45151\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/resources\/99928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/types\/resources"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/users\/56014"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media\/99929"}],"wp:attachment":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media?parent=99928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/categories?post=99928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/tags?post=99928"},{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/resource_type?post=99928"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/ppma_author?post=99928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}