Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Beyond the inbox: ThreatLabz 2025 Phishing Report reveals how phishing is evolving in the age of genAI

Gone are the days of mass phishing campaigns. Today’s attackers are leveraging generative AI (GenAI) to deliver hyper-targeted scams, transforming every email, text, or call into a calculated act of manipulation. With flawless lures and tactics designed to outsmart AI defenses, cybercriminals are zeroing in on HR, payroll, and finance teams—exploiting human vulnerabilities with precision.

The Zscaler ThreatLabz 2025 Phishing Report dives deep into the rapidly evolving phishing landscape and uncovers the latest trends, including top phishing targets, real-world examples of AI-driven phishing attacks, and actionable best practices to defend against the next wave of AI-powered phishing threats.

Key findings on phishing attacks

The ThreatLabz research team analyzed over 2 billion blocked phishing transactions captured across the Zscaler Zero Trust Exchange™ cloud security platform from January 2024 to December 2024 and uncovered several key findings:

  • Phishing is down but is more targeted: Although global phishing volume dropped 20% in 2024, attackers are shifting strategies, focusing on high-impact campaigns targeting high-value targets to maximize their success rates.
  • United States phishing declines but remains #1: TheUS remains a top target even though phishing in the US dropped 31.8% as a result of stronger email authentication protocols like DMARC and Google’s sender verification, which blocked 265 billion unauthenticated emails.
  • Education is under attack: Phishing in education surged 224%, with threat actors exploiting academic calendars, financial aid deadlines, and weak security defenses.
  • Crypto scams rise with fake wallets: Fake cryptocurrency platforms are on the rise, luring users into credential-harvesting sites disguised as wallet alerts or login pages under the guise of legitimate transactions.
  • Tech support and job scams thrive: With over 159 million hits in 2024, scammers use job sites, social media, and live chat tools to impersonate recruiters or IT staff, stealing sensitive information, credentials, and payment details.

Evolving phishing trends to watch in 2025

ThreatLabz uncovered many significant evolving trends in phishing attacks, with attackers adopting advanced tactics to bypass defenses and exploit human trust. The report highlights five key trends shaping the phishing landscape:

  • Vishing takes center stage: Voice phishing (vishing) has become a prominent tactic, with attackers impersonating IT support to steal credentials in real time.
  • CAPTCHA as a shield for phishing sites: Attackers are using CAPTCHAs to make phishing pages appear legitimate and evade security tools.
  • Crypto scams on the rise: Fake cryptocurrency exchanges and wallets lure users through convincing decoy sites, enabling attackers to steal credentials and access victims’ digital funds.
  • Phishing targets AI hype: Fraudulent “AI agent” websites that mimic real platforms are exploiting the growing trust in AI to steal user credentials and payment details.

Zscaler Zero Trust Exchange mitigates AI-powered phishing attacks

Phishing is no longer just spam that clogs inboxes—it is now powered by AI to exploit human vulnerability. The Zscaler Zero Trust Exchange is designed to combat these increasingly sophisticated attacks at every stage of the attack chain, turning the tables on cybercriminals.

Preventing Initial Compromise

Phishing attacks strike where trust is most fragile. Zscaler decrypts and inspects TLS/SSL traffic inline to block malicious content in real time, using AI-powered threat detection to identify phishing sites, malware, and zero day payloads. Suspicious websites are isolated in Zero Trust Browser sessions, shielding users from drive-by downloads, malware, and zero-day infections. Dynamic access controls continuously adjust user permissions based on risk signals, helping block threats without disrupting legitimate user activity and workflows.

Eliminating Lateral Movement

Phishing doesn’t stop at initial compromise—attackers aim to infiltrate and expand. Zscaler prevents lateral movement by connecting users directly to applications—not networks—ensuring compromised accounts can’t cascade into systemic breaches. AI-powered segmentation enforces least-privileged access at the application level, reducing the blast radius to a single siloed application and containing threats before they can spread.

Shutting Down Compromised Accounts and Insider Threats

Zscaler enforces context-aware policies, leveraging signals like user identity and behavior and device posture, to ensure only authenticated users and devices gain access to applications, data, and workloads, strengthened by integrated multi-factor authentication (MFA). For the attackers hiding in the shadows, deception technology deploys fake assets that detect and trap attackers early—catching them before they do real harm.

Preventing Data Theft at Every Level

Zscaler safeguards sensitive data with real-time traffic inspection, even for encrypted data flows, ensuring no exfiltration takes place. Data Loss Prevention (DLP) policies extend these protections across apps, email, and even emerging GenAI tools, securing what matters most.

Phishing may be evolving, but with Zscaler’s Zero Trust Exchange, organizations can stay ahead and redefine their cyber defense for a new generation of threats.

Stay ahead of AI-powered phishing attacks

Cybercriminals are raising the stakes and using AI to evade detection and personalize and amplify their attacks. As phishing evolves into more sophisticated and targeted threats, staying ahead requires understanding the latest tactics and adopting proactive defenses. The Zscaler Threatlabz 2025 Phishing Report delivers:

  • In-depth analysis: Learn how attackers are weaponizing AI to craft personalized phishing lures.
  • 2025 predictions: Get expert insights into the emerging strategies and technologies shaping the future of phishing.
  • Actionable best practices: Deploy proven strategies to fortify your defenses against targeted phishing campaigns.

The battle against phishing requires relentless vigilance. Dive into the full report for the insights and tools needed to protect your organization from evolving threats.

Download your copy today.


Read More from This Article: Beyond the inbox: ThreatLabz 2025 Phishing Report reveals how phishing is evolving in the age of genAI
Source: News

Category: NewsApril 28, 2025
Tags: art

Post navigation

PreviousPrevious post:칼럼 | ‘놀 때와 일할 때가 다르다’ AI와 더 잘 대화하는 법NextNext post:カスタマー中心のIT:顧客体験を成功に導くための戦略

Related posts

AWS-SAP, ‘공동 AI 혁신 프로그램’ 발표··· “기업 맞춤형 AI 개발 지원”
May 22, 2025
2025년 CIO 어젠더를 정의하는 5가지 질문
May 22, 2025
애플 디자인 철학, AI로 이어질까···오픈AI, 조니 아이브 기업 ‘IO’ 인수
May 22, 2025
PwCのCITO(最高情報技術責任者)が語る「CIOの魅力」とは
May 21, 2025
M&S says it will respond to April cyberattack by accelerating digital transformation plans
May 21, 2025
AI and load balancing
May 21, 2025
Recent Posts
  • AWS-SAP, ‘공동 AI 혁신 프로그램’ 발표··· “기업 맞춤형 AI 개발 지원”
  • 2025년 CIO 어젠더를 정의하는 5가지 질문
  • 애플 디자인 철학, AI로 이어질까···오픈AI, 조니 아이브 기업 ‘IO’ 인수
  • PwCのCITO(最高情報技術責任者)が語る「CIOの魅力」とは
  • M&S says it will respond to April cyberattack by accelerating digital transformation plans
Recent Comments
    Archives
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.