CYBER 101

  • Alerts
  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Join our newsletter

FOLLOW US

  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial

Phishing campaign

1 min read
in Cyber101, Definition

A phishing campaign is an email scam designed to steal personal information from victims. Cybercriminals use phishing, the fraudulent attempt to obtain sensitive information such as credit card details and login credentials, by disguising as a trustworthy organization or reputable person in an email communication.

Related

Tags: Adults DefinitionsCorporationsCorporations DefinitionsCyber Professionals DefinitionsDefinitionsEcommerceEcommerce-DefinitionsExecutivesExecutives DefinitionsInvestorsKidsSeniorsStartupsTravelerswomen
72
VIEWS
ADVERTISEMENT

Related Posts

Cyber Security Incident Response Team (CSIRT)

Cyber Security Incident Response Team (CSIRT)

August 10, 2022
Data Loss Prevention (DLP)

Data Loss Prevention (DLP)

August 10, 2022
Intrusion Protection System (IPS)

Intrusion Protection System (IPS)

August 10, 2022
Intrusion Detection System (IDS)

Intrusion Detection System (IDS)

August 10, 2022

More Articles

TCP (Transmission Control Protocol)

April 3, 2021
Incidents

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

June 24, 2022
TV Show

The Corbett Report: Episode 358 – The 5G Dragnet

March 29, 2021
Cyber101

Structured Threat Hunting

June 28, 2022

File Infectors

January 12, 2021
Quotes

“My fear is that we are neglecting the…”

November 9, 2020
Incidents

Ghana govt agency exposed 700k citizens’ data in a database mess up

December 22, 2021
Quotes

“The totality of a person’s experience…”

February 3, 2022
Load More

Security through data

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
Search

More...

Generic filters
Filter by Categories
Alerts
Blog
Book
Incidents
Quotes
Tutorials
Certification
Cheat Sheet
Course
Game
Meme
Movie
Paper
Podcast
Report
Software
TV Show

Try these: DDoSGDPRMalware

  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Join our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.