<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>phishing Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/phishing/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/phishing/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Tue, 20 Jan 2026 05:52:07 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>phishing Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/phishing/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Google Sues China-Based Scammers: The Growing Threat of International Phishing Rings</title>
		<link>https://www.vertexcybersecurity.com.au/the-global-reach-of-cyber-scams-why-distance-no-longer-protects-your-business/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-global-reach-of-cyber-scams-why-distance-no-longer-protects-your-business</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 22 Dec 2025 02:31:36 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[business security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Breach Prevention]]></category>
		<category><![CDATA[Fraud Awareness]]></category>
		<category><![CDATA[Global Threats]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10099</guid>

					<description><![CDATA[Google's lawsuit against an overseas scam ring highlights the global nature of cyber threats. Learn why businesses must be prepared for international attacks.]]></description>
		
		
		
			</item>
		<item>
		<title>Startups and Cyber Security: When Is the Right Time to Start?</title>
		<link>https://www.vertexcybersecurity.com.au/startups-and-cyber-security-when-is-the-right-time-to-start/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=startups-and-cyber-security-when-is-the-right-time-to-start</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 08 Dec 2025 02:18:33 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Startup]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[FinTech Security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[SOC 2]]></category>
		<category><![CDATA[startups]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9979</guid>

					<description><![CDATA[Startups often delay cyber security to save cash, but risks rise with funding and marketing. Discover the essential cyber foundations you need before it's too late.]]></description>
		
		
		
			</item>
		<item>
		<title>Will Delaying Cyber Security kill your business</title>
		<link>https://www.vertexcybersecurity.com.au/the-levitas-capital-case-why-you-cannot-afford-to-delay-cyber-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-levitas-capital-case-why-you-cannot-afford-to-delay-cyber-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 18 Nov 2025 23:53:13 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[Levitas Capital]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[SOC 2]]></category>
		<category><![CDATA[Vertex Cyber Security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9903</guid>

					<description><![CDATA[Discover how the Levitas Capital cyber attack led to their closure. Learn why proactive, high-quality cyber security, like Vertex's expert services and platforms, is crucial now to avoid irreversible business damage.]]></description>
		
		
		
			</item>
		<item>
		<title>The Qantas Data Breach: What It Means and Steps to Consider</title>
		<link>https://www.vertexcybersecurity.com.au/the-qantas-data-breach-what-it-means-and-steps-to-consider/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-qantas-data-breach-what-it-means-and-steps-to-consider</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 21 Oct 2025 05:07:19 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Scattered LAPSUS$ Hunters]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9754</guid>

					<description><![CDATA[The Qantas data breach, part of a wider Salesforce attack by Scattered LAPSUS$ Hunters, has exposed customer data. Learn the risks and what steps to consider.]]></description>
		
		
		
			</item>
		<item>
		<title>Did an IT or Cyber Provider Try to Sell You a SOC Service?</title>
		<link>https://www.vertexcybersecurity.com.au/did-an-it-or-cyber-provider-try-to-sell-you-a-soc-service/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=did-an-it-or-cyber-provider-try-to-sell-you-a-soc-service</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 08 Sep 2025 03:10:13 +0000</pubDate>
				<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[Security Operations Centre]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity strategy]]></category>
		<category><![CDATA[IT Provider]]></category>
		<category><![CDATA[Log Monitoring]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[MSP]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Vertex Cyber Security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9647</guid>

					<description><![CDATA[In the world of cybersecurity, there is a vast array of services and solutions, each promising to be the key to protecting your business. One service that is often presented as the ultimate defence is a Security Operations Centre, commonly known as a SOC. If you have been in discussions with an IT provider, a [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Are You Receiving Phishing Emails That Are Personalised? Be Warned.</title>
		<link>https://www.vertexcybersecurity.com.au/are-you-receiving-phishing-emails-that-are-personalised-be-warned/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-you-receiving-phishing-emails-that-are-personalised-be-warned</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 26 Aug 2025 01:03:33 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9581</guid>

					<description><![CDATA[It is an unsettling experience: a suspicious email lands in your inbox, but instead of the usual generic greeting, it addresses you by your name or mentions your company. This is not just an unlucky coincidence; it is often one of the first signs that you are the target of a deliberate cyber attack. While [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Staying Safe Online: Lessons from the Case of the &#8220;Evil Twin&#8221;</title>
		<link>https://www.vertexcybersecurity.com.au/staying-safe-online-lessons-from-the-case-of-the-evil-twin/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=staying-safe-online-lessons-from-the-case-of-the-evil-twin</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 24 Jul 2024 06:36:43 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[MFA (multi-factor authentication)]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<category><![CDATA[Cyber Crime Prevention]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[Digital Privacy]]></category>
		<category><![CDATA[Evil Twin Networks]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Public Wi-Fi]]></category>
		<category><![CDATA[Two-Factor Authentication]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8314</guid>

					<description><![CDATA[The recent apprehension of a man accused of creating &#8220;evil twin&#8221; Wi-Fi networks to steal personal information has highlighted the ongoing threat of cyber crimes. As we increasingly rely on digital connectivity, it&#8217;s crucial to adopt practices that enhance our online security. Here’s how you can keep yourself safe online, drawing lessons from the case [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>AI will increase Phishing Cyber attacks</title>
		<link>https://www.vertexcybersecurity.com.au/ai-will-increase-phishing-cyber-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ai-will-increase-phishing-cyber-attacks</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 16 Feb 2024 00:18:25 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[AI Cyber]]></category>
		<category><![CDATA[AI Cyber Security]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7615</guid>

					<description><![CDATA[Phishing campaigns, particularly those powered by artificial intelligence (AI), represent one of the most insidious forms of cyber threats facing companies today. The integration of AI into phishing operations has significantly enhanced the effectiveness and sophistication of these attacks, making them more difficult to detect and resist. Here&#8217;s a deeper dive into how AI-driven phishing [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>&#8216;Hey Mum&#8217; Scam</title>
		<link>https://www.vertexcybersecurity.com.au/hey-mum-scam/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hey-mum-scam</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 30 Aug 2022 02:26:21 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[cyber scam]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4642</guid>

					<description><![CDATA[Scamwatch has issued a warning to Australian parents for a new scam, termed &#8216;hey mum&#8217;, which has fleeced Australian parents of over $2 million in just a few months. The scammers prey on the instinct of parents to care for their children by sending text messages pretending to be the parents&#8217; child and claiming that [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Protect Your Business From a Phishing Attack</title>
		<link>https://www.vertexcybersecurity.com.au/protect-your-business-from-a-phishing-attack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-your-business-from-a-phishing-attack</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Fri, 28 Jan 2022 11:31:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security monitoring]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing attack]]></category>
		<category><![CDATA[phishingattack]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4122</guid>

					<description><![CDATA[With 2021 being a record year for cyber attacks, the writing is on the wall; companies need to invest in cyber security to prevent an attack. But with the sheer volume of attack vectors, it&#8217;s important that companies are aware of the most common attack types in order to prioritise their spending. Ransomware has seen [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
