Weinz et al., 2025 - Google Patents
The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against OrganizationsWeinz et al., 2025
View PDF- Document ID
- 12036926427413341415
- Author
- Weinz M
- Zannone N
- Allodi L
- Apruzzese G
- Publication year
- Publication venue
- Proceedings of the 20th ACM Asia Conference on Computer and Communications Security
External Links
Snippet
Modern organizations are persistently targeted by phishing emails. Despite advances in detection systems and widespread employee training, attackers continue to innovate, posing ongoing threats. Two emerging vectors stand out in the current landscape: QR-code baits …
- 238000012549 training 0 abstract description 79
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12069083B2 (en) | Assessing security risks of users in a computing network | |
US20240089285A1 (en) | Automated responsive message to determine a security risk of a message sender | |
Priestman et al. | Phishing in healthcare organisations: Threats, mitigation and approaches | |
US10623441B2 (en) | Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams | |
US20210240836A1 (en) | System and method for securing electronic correspondence | |
Zhuo et al. | SoK: Human-centered phishing susceptibility | |
Nthala et al. | Informal support networks: an investigation into home data security practices | |
Baraković et al. | Cyber hygiene knowledge, awareness, and behavioral practices of university students | |
Das | A risk-reduction-based incentivization model for human-centered multi-factor authentication | |
Weinz et al. | The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against Organizations | |
Pinto et al. | Assessing the relevance of cybersecurity training and policies to prevent and mitigate the impact of phishing attacks | |
Alharthi | Social engineering defense mechanisms and InfoSec policies: A survey and qualitative analysis | |
Boothroyd | Older Adults' Perceptions of Online Risk | |
Torten | A quantitative regression study of the impact of security awareness on information technology professionals' desktop security behavior | |
Kuraku | Curiosity Clicks: The Need for Security Awareness | |
Guo et al. | The role of professional product reviewers in evaluating security and privacy | |
McAnulty | Phishing Attacks: A Plan to Educate Employees and Mitigate Risks | |
Zou | Understanding and Improving Consumers' Adoption of Online Privacy-Protective Behaviors | |
Almotiri | Security & Privacy Awareness & Concerns of Computer Users Posed by Web Cookies and Trackers | |
Kyi | End User Mental Models of Social Engineering Attacks | |
Noble | Developing a Theoretical Methodology for Assessing Phishing Susceptibility in an Academic Context | |
Abdelaziz | Responsibility, Trust, and Monitoring Tools for End-User Account Security | |
Chaudhary | Cyber Security Threats in social media | |
Sthapit et al. | Analysis of Web Application Security Management in Context of Nepal’s Organizations | |
Payne et al. | The prevalence of the insider threat within day-to-day devices and their risks to information security |