Phishing attacks have become one of the most prevalent, and effective, methods of cybercrime. This brief defines a phishing attack, details the various methods and components, and outlines critical steps necessary for prevention.
Today’s attackers are well-funded and well-equipped. They use evasive tactics to succeed in gaining a foothold in the network, launching both high-volume and sophisticated attacks while remaining invisible to an organization’s traditional defenses – from packet obfuscation, polymorphic malware and encryption to multi-phased payloads and fast-flux DNS.
To enable organisations to securely roll out new services and apps, Palo Alto
Networks built the Next-Generation Security Platform to provide prevention
through automation, applied consistently across the network, endpoint and