{"id":2495,"date":"2024-01-09T15:51:38","date_gmt":"2024-01-09T15:51:38","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=2495"},"modified":"2026-05-04T13:53:44","modified_gmt":"2026-05-04T12:53:44","slug":"phishing-in-2024-five-modern-tactics","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/","title":{"rendered":"Phishing in 2024: Five Modern Tactics"},"content":{"rendered":"\n<p>Phishing remains a persistent and pervasive threat in the digital landscape, preying on end users and organisations alike. As technology advances, phishing campaigns continue to improve in sophistication, emphasising on the need for vigilance and awareness. To support your organisation in better protecting itself against this ever-present threat, here is an overview of the five most emerging phishing trends in 2024. \u00a0<\/p>\n\n\n\n<p>Despite being one of the oldest types of cyberattacks, phishing continues to pose significant challenges to organisations of all sizes, in all sectors. Cybercriminals continue to evolve their phishing attack techniques, experimenting with different lures, adopting new social engineering tricks, and embracing new ways to avoid detection.<\/p>\n\n\n\n<p>In this blog we share valuable insights into the latest ways threat actors try to bypass your organisation\u2019s defences and zoom in on how to better protect yourself.<\/p>\n\n\n\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What are Phishing Tactics?<\/h2>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>likelihood of experiencing a phishing attack. This is when an attacker aims to steal valuable data, such as login details or <\/strong><a href=\"https:\/\/cwsisecurity.com\/news-android-vulnerability-exposes-bank-account-credentials\/\"><strong>bank account<\/strong><\/a><strong> information.<\/strong><\/p>\n\n\n\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Five 2024 Phishing Trends<\/h2>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The following five phishing tactics are being experienced by firms in 2024:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Emails sent from trusted third parties<\/li>\n\n\n\n<li>Emails with legitimate URLs<\/li>\n\n\n\n<li>OneNote Malware<\/li>\n\n\n\n<li>OAuth device code phishing<\/li>\n\n\n\n<li>Other targeted phishing attempts<\/li>\n<\/ol>\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-emails-sent-from-trusted-third-parties\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Emails Sent From Trusted Third Parties<\/mark><\/h3>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Attackers increasingly send phishing emails to all the contacts of their victims and then respond on the email thread with specially crafted messages and a malicious URL.<\/p>\n\n\n\n<div style=\"height:48px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Emails with Legitimate URLs<\/mark><\/h3>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Attackers host phishing URLs on legitimate cloud service providers such as <a href=\"https:\/\/www.adobe.com\/uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Adobe<\/a>, <a href=\"https:\/\/www.dropbox.com\/official-teams-page?_tk=paid_sem_goog_biz_b&amp;_camp=1033325405&amp;_kw=dropbox|e&amp;_ad=676295654132||c&amp;gad_source=1&amp;gclid=CjwKCAiA-vOsBhAAEiwAIWR0Tc8Ojyk3nnMcApVYWCIZ42U-4zVVD0oecCcufNf2ZpDDs1ffwS5hthoC9YIQAvD_BwE\">Dropbox<\/a>, Google, and <a href=\"https:\/\/www.microsoft.com\/en-gb\/security\/business\/endpoint-security\/microsoft-defender-business-b?ef_id=_k_CjwKCAiA-vOsBhAAEiwAIWR0TcOqsxyoGc5cxDG_HrGTyB6HeRwi5PipW3VOlAMhIy3VJ1ObA1XiFxoCXK4QAvD_BwE_k_&amp;OCID=AIDcmmbwq30y4u_SEM__k_CjwKCAiA-vOsBhAAEiwAIWR0TcOqsxyoGc5cxDG_HrGTyB6HeRwi5PipW3VOlAMhIy3VJ1ObA1XiFxoCXK4QAvD_BwE_k_&amp;gad_source=1&amp;gclid=CjwKCAiA-vOsBhAAEiwAIWR0TcOqsxyoGc5cxDG_HrGTyB6HeRwi5PipW3VOlAMhIy3VJ1ObA1XiFxoCXK4QAvD_BwE\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft<\/a>. After multiple redirects, victims are led to the \ufb01nal landing page, which steals credentials or downloads malicious payloads onto their machine. Given these are popular services, it is di\ufb03cult to distinguish malicious links from genuine ones.<\/p>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">OneNote Malware<\/mark><\/h3>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Attackers abuse OneNote to execute malicious software. Phishing campaigns observed by Microsoft Defender Experts include OneNote attachments, URLs leading users to download OneNote attachments, and PDFs containing URLs that led to OneNote malware downloading.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/01\/Website-long-Images-1.png\" alt=\"Rounded image of women with phone walking \" class=\"wp-image-2496\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">OAuth Device Code Phishing<\/mark><\/h3>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The attacker generates a <a href=\"https:\/\/cwsisecurity.com\/protecting-your-data-against-user-mistakes\/\" target=\"_blank\" rel=\"noreferrer noopener\">user<\/a> code, then creates a phishing email with it and a link to provide the code. This allows the attacker to sign-in on behalf of the user.<\/p>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Other Targeted Phishing Attempts<\/mark><\/h3>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Microsoft\u2019s experts also observed targeted phishing attempts in which attackers identi\ufb01ed user-speci\ufb01c details through social engineering, then created tailored phishing campaigns using look-alike domains to which the users have subscribed, with contents matching the users\u2019 interests. This signi\ufb01cantly increases the success rate of a compromise attempt.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#47ceb9\" class=\"has-inline-color\">How to Step Up Your Game<\/mark><\/h2>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The first step in defending your business against phishing is making sure that your employees know that these attacks exist and what they consist of. With education being one of the best defences against phishing, phishing simulation tools are a great way to decrease click rates and possible data breaches.<\/p>\n\n\n\n<p>Want to learn more about how Microsoft\u2019s Attack Simulation Training can empower your employees to defend against phishing attacks? Catch up below on our &#8216;<a href=\"https:\/\/youtu.be\/AVbf2cD6rog\">Security Awareness with Microsoft Webinar<\/a>&#8216; where our Microsoft security experts help you get up to speed on the trainings key capabilities and best practices with regards to the set-up, deployment, and reporting.<\/p>\n\n\n\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Webinar | Security Awareness with Microsoft\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/AVbf2cD6rog?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Phishing remains a persistent and pervasive threat in the digital landscape, preying on end users and organisations alike. As technology advances, phishing campaigns continue to improve in sophistication, emphasising on the need for vigilance and awareness. To support your organisation in better protecting itself against this ever-present threat, here is an overview of the five [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8592,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[93,4],"tags":[],"sector":[],"solution":[308],"class_list":["post-2495","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice","solution-secure-operations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Phishing in 2024: Five Modern Tactics | CWSI<\/title>\n<meta name=\"description\" content=\"To support your organisation in better protecting itself against this ever-present threat, here is an overview of the five most emerging phishing trends. \u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing in 2024: Five Modern Tactics\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-09T15:51:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-04T12:53:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-1175420650-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/\"},\"headline\":\"Phishing in 2024: Five Modern Tactics\",\"datePublished\":\"2024-01-09T15:51:38+00:00\",\"dateModified\":\"2026-05-04T12:53:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/\"},\"wordCount\":541,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iStock-1175420650-scaled.jpg\",\"articleSection\":[\"Insights\",\"Our Voice\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/\",\"name\":\"Phishing in 2024: Five Modern Tactics | CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iStock-1175420650-scaled.jpg\",\"datePublished\":\"2024-01-09T15:51:38+00:00\",\"dateModified\":\"2026-05-04T12:53:44+00:00\",\"description\":\"To support your organisation in better protecting itself against this ever-present threat, here is an overview of the five most emerging phishing trends. \u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iStock-1175420650-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iStock-1175420650-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Lifestyle new business office in Barcelona.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/phishing-in-2024-five-modern-tactics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing in 2024: Five Modern Tactics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing in 2024: Five Modern Tactics | CWSI","description":"To support your organisation in better protecting itself against this ever-present threat, here is an overview of the five most emerging phishing trends. \u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/","og_locale":"nl_NL","og_type":"article","og_title":"Phishing in 2024: Five Modern Tactics","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/","og_site_name":"CWSI","article_published_time":"2024-01-09T15:51:38+00:00","article_modified_time":"2026-05-04T12:53:44+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-1175420650-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/"},"headline":"Phishing in 2024: Five Modern Tactics","datePublished":"2024-01-09T15:51:38+00:00","dateModified":"2026-05-04T12:53:44+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/"},"wordCount":541,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-1175420650-scaled.jpg","articleSection":["Insights","Our Voice"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/","url":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/","name":"Phishing in 2024: Five Modern Tactics | CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-1175420650-scaled.jpg","datePublished":"2024-01-09T15:51:38+00:00","dateModified":"2026-05-04T12:53:44+00:00","description":"To support your organisation in better protecting itself against this ever-present threat, here is an overview of the five most emerging phishing trends. \u00a0","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/#primaryimage","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-1175420650-scaled.jpg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/05\/iStock-1175420650-scaled.jpg","width":2560,"height":1707,"caption":"Lifestyle new business office in Barcelona."},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/phishing-in-2024-five-modern-tactics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Phishing in 2024: Five Modern Tactics"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=2495"}],"version-history":[{"count":1,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2495\/revisions"}],"predecessor-version":[{"id":8794,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2495\/revisions\/8794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media\/8592"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=2495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=2495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=2495"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/sector?post=2495"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/solution?post=2495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}