Security Training October 10, 2025

Phishing Attack Evolution: Training Your Users for 2025

By David Rodriguez, Director of Security Operations | 9 min read

Phishing remains the #1 attack vector for cybercriminals. According to the 2025 Verizon Data Breach Investigations Report, 36% of breaches involved phishing. As attacks become more sophisticated—leveraging AI, deepfakes, and social engineering—traditional awareness training is no longer sufficient. This article explores emerging phishing tactics and provides a framework for building a security-aware culture.

Evolution of Phishing Tactics

AI-Powered Phishing

Attackers now use large language models to craft highly personalized, grammatically perfect phishing emails at scale:

  • Context-Aware Content: Emails reference recent company news, projects, or conversations
  • Perfect Grammar: No more obvious typos or broken English
  • Localization: Automatically translated into target's native language
  • Personalization: Leveraging scraped data from LinkedIn, social media

Business Email Compromise (BEC) 2.0

According to the FBI's IC3, BEC caused $2.9 billion in losses in 2023:

  • CEO fraud with deepfake voice calls
  • Vendor email compromise
  • Wire transfer redirection
  • Payroll diversion attacks
  • Attorney impersonation

Multi-Channel Attacks (MFA Fatigue)

Attackers combine email with phone calls, SMS, and push notification spam:

  • MFA Fatigue: Bombarding users with push notifications until they approve
  • Vishing: Phone calls posing as IT help desk
  • Smishing: SMS messages with malicious links
  • QR Code Phishing: Malicious QR codes bypassing email security

Cloud and SaaS Phishing

Targeting cloud credentials and OAuth tokens:

  • Fake Microsoft 365/Google Workspace login pages
  • OAuth consent phishing (malicious app permissions)
  • Salesforce, Slack, Teams phishing
  • Cloud storage sharing scams

Technical Defenses

Email Security Platforms

Deploy advanced email security beyond native protections:

Email Authentication

Implement these protocols to prevent domain spoofing:

  • SPF (Sender Policy Framework): Specify authorized mail servers
  • DKIM (DomainKeys Identified Mail): Cryptographic email signing
  • DMARC (Domain-based Message Authentication): Policy enforcement and reporting

Tools: Dmarcian, Agari, Valimail

Browser Isolation

Isolate web browsing to contain threats:

Phishing-Resistant MFA

Move beyond SMS and push notifications:

  • FIDO2/WebAuthn: Hardware security keys (YubiKey, Google Titan)
  • Certificate-based authentication: Device certificates
  • Passkeys: Next-gen passwordless authentication
  • Number matching: Microsoft Authenticator with number matching

Building Security Awareness Culture

Beyond Annual Training

Traditional annual compliance training doesn't work. Implement continuous, engaging programs:

Security Awareness Platforms

Phishing Simulation Programs

Best practices for effective simulations:

  • Start Easy: Begin with obvious phishing, increase difficulty over time
  • Immediate Feedback: Just-in-time training when users click
  • Realistic Scenarios: Mimic actual threats your organization faces
  • Regular Cadence: Monthly or bi-weekly simulations
  • No Punishment: Focus on education, not blame
  • Executive Participation: Include all levels, including C-suite

Training Content Strategy

Diversify training delivery:

  • Micro-Learning: 3-5 minute modules vs. 30-minute courses
  • Gamification: Points, badges, leaderboards for engagement
  • Video Content: Short, engaging videos on specific topics
  • Posters and Signage: Physical reminders in office spaces
  • Newsletters: Monthly security tips and threat updates
  • Slack/Teams Bots: Interactive security quizzes

Phishing Reporting

Make reporting easy and rewarding:

  • One-click phishing report button in email client
  • Acknowledge all reports within 1 hour
  • Positive reinforcement for reporting (even false positives)
  • Share statistics: "This month our team reported 150 phishing emails"
  • Celebrate catches: Recognize employees who reported real threats

Tools: Microsoft Report Message Add-in, Cofense Reporter

Measuring Program Effectiveness

Key Metrics

  • Phish-Prone Percentage: Users who click simulated phishing (target: <10%)
  • Repeat Clickers: Users who fail multiple simulations
  • Reporting Rate: Percentage of simulations reported
  • Time to Report: Speed of phish reporting
  • Training Completion: Percentage completing assigned training
  • Real-World Catches: Actual phishing emails reported by users

Benchmarking

According to KnowBe4's Phishing Benchmarks:

  • Baseline (untrained): 32.4% click rate
  • After 90 days of training: 16.4%
  • After 12 months: 4.8%
  • Best-in-class organizations: <2%

Targeted Training for High-Risk Groups

Executives and VIPs

C-suite and high-value targets need specialized training:

  • BEC and whaling attack scenarios
  • Social media oversharing risks
  • Travel security and hotel Wi-Fi
  • Executive assistant training on wire transfers

Finance and Accounting

Primary targets for wire fraud:

  • Vendor email compromise scenarios
  • Wire transfer verification procedures
  • Out-of-band confirmation requirements
  • Segregation of duties enforcement

IT and Security Teams

Don't assume technical staff are immune:

  • Supply chain and software update compromises
  • Technical social engineering
  • Advanced persistent threats (APT)
  • Insider threat awareness

Creating a Security Culture

Leadership Engagement

  • Executive sponsorship and participation
  • Security included in all-hands meetings
  • C-suite sharing security messages
  • Security metrics in board reporting

Positive Reinforcement

  • Celebrate security wins, not just breaches
  • Recognize employees who report threats
  • Security champion programs
  • Incentivize good security behavior

Make Security Everyone's Job

  • Include security in job descriptions
  • Security awareness in onboarding
  • Regular security updates in team meetings
  • Easy access to security team for questions

Conclusion

Phishing will continue to evolve, leveraging AI and sophisticated social engineering. While technical controls are essential, your users remain the last line of defense. Organizations that invest in continuous, engaging security awareness programs—combined with a blame-free culture that encourages reporting—can dramatically reduce their phishing risk.

Remember: security awareness is not a one-time checkbox. It's an ongoing program that requires commitment, measurement, and continuous improvement. The goal isn't perfection—it's resilience.

Ready to Transform Your Security Culture?

Our security awareness experts help organizations build engaging training programs that actually change behavior. Let's assess your current program and develop a roadmap.

Get Started

References and Additional Resources

← Back to Resources