CISA, NSA, FBI, MS-ISAC Publish Guide on Preventing Phishing Intrusions
The guide categorizes phishing into two common tactics: obtaining login credentials and deploying malware, and provides details on techniques used by malicious actors, such as impersonation and spoofing, to carry out these attacks.