[go: up one dir, main page]

Weinz et al., 2025 - Google Patents

The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against Organizations

Weinz et al., 2025

View PDF
Document ID
12036926427413341415
Author
Weinz M
Zannone N
Allodi L
Apruzzese G
Publication year
Publication venue
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security

External Links

Snippet

Modern organizations are persistently targeted by phishing emails. Despite advances in detection systems and widespread employee training, attackers continue to innovate, posing ongoing threats. Two emerging vectors stand out in the current landscape: QR-code baits …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
US12069083B2 (en) Assessing security risks of users in a computing network
US20240089285A1 (en) Automated responsive message to determine a security risk of a message sender
Priestman et al. Phishing in healthcare organisations: Threats, mitigation and approaches
US10623441B2 (en) Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams
US20210240836A1 (en) System and method for securing electronic correspondence
Zhuo et al. SoK: Human-centered phishing susceptibility
Nthala et al. Informal support networks: an investigation into home data security practices
Baraković et al. Cyber hygiene knowledge, awareness, and behavioral practices of university students
Das A risk-reduction-based incentivization model for human-centered multi-factor authentication
Weinz et al. The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against Organizations
Pinto et al. Assessing the relevance of cybersecurity training and policies to prevent and mitigate the impact of phishing attacks
Alharthi Social engineering defense mechanisms and InfoSec policies: A survey and qualitative analysis
Boothroyd Older Adults' Perceptions of Online Risk
Torten A quantitative regression study of the impact of security awareness on information technology professionals' desktop security behavior
Kuraku Curiosity Clicks: The Need for Security Awareness
Guo et al. The role of professional product reviewers in evaluating security and privacy
McAnulty Phishing Attacks: A Plan to Educate Employees and Mitigate Risks
Zou Understanding and Improving Consumers' Adoption of Online Privacy-Protective Behaviors
Almotiri Security & Privacy Awareness & Concerns of Computer Users Posed by Web Cookies and Trackers
Kyi End User Mental Models of Social Engineering Attacks
Noble Developing a Theoretical Methodology for Assessing Phishing Susceptibility in an Academic Context
Abdelaziz Responsibility, Trust, and Monitoring Tools for End-User Account Security
Chaudhary Cyber Security Threats in social media
Sthapit et al. Analysis of Web Application Security Management in Context of Nepal’s Organizations
Payne et al. The prevalence of the insider threat within day-to-day devices and their risks to information security