Security Knowledge Library
Stay ahead of every attacker.
Research, playbooks, threat intelligence and deep-dives on the attacks targeting your workforce — curated by the PHRONTIQ security team.
Featured Report · 2026
The Human Risk Report: AI Phishing & the Evolving Threat
Our annual analysis of 12 million simulated attacks — AI-generated phishing effectiveness, industry click-rate benchmarks, and new attack vectors targeting enterprise workforces in 2026.
🎣
Phishing & Email Attacks
42 ARTICLES🤖
AI Threats
How AI-generated spear phishing bypasses human intuition
GPT-class models craft hyper-personalised phishing with zero template reuse. The implications for your workforce.
📱
Multi-Vector
Vishing & smishing: the phone calls your employees are failing
Voice and SMS attacks now account for 28% of initial access. Most organisations simulate neither.
📷
QR Attacks
QR code phishing: the attack your email gateway misses entirely
QR codes embed URLs invisible to secure email gateways. A 340% YoY rise makes quishing a top-priority vector.
🎯
Executive Risk
Whaling attacks: why your C-suite is the highest-value target
Executives receive 3× more targeted phishing. The payoff: BEC, wire fraud, M&A intelligence theft.
🔐
AiTM
Adversary-in-the-Middle: bypassing MFA at scale
Frameworks like Evilginx2 make MFA bypass trivially accessible to mid-level threat actors.
📊
Benchmarks
2026 phishing click rate benchmarks by industry and department
Finance: 34%. Healthcare: 41%. Engineering: 12%. Where does your organisation stand?
🔒
Ransomware Defense
28 ARTICLES⛓️
Kill Chain
Ransomware kill chain: from phishing email to encryption
Every major ransomware incident follows a predictable path. Full MITRE ATT&CK mapping of the attack lifecycle.
💰
Threat Intel
Double extortion ransomware: what it means for your IR
Modern groups encrypt AND exfiltrate. Paying the ransom no longer prevents data exposure. Your IR playbook needs updating.
🛡️
Playbook
Ransomware recovery: the first 72 hours step-by-step
Containment, eradication, and recovery — tested against incidents affecting 250+ PHRONTIQ customers.
💼
Business Email Compromise & Fraud
15 ARTICLES📧
BEC
Business Email Compromise: the $50B fraud that starts with one click
BEC causes more financial damage than ransomware, targeting finance and HR with social engineering — not malware.
🏢
Supply Chain
Vendor email compromise: the supply chain attack your controls miss
Attackers compromise suppliers' email to redirect payments using established trust. How to detect and simulate this.
✅
Checklist
BEC prevention: 14 controls every finance team needs
A practical checklist of technical and procedural controls that prevent the most common BEC scenarios.
🎭
Social Engineering
19 ARTICLES🧠
Psychology
The psychology of deception: why smart people click
Cialdini's principles and the cognitive biases attackers exploit — and how to build a sceptical, resilient workforce.
🤳
AI Impersonation
Deepfake voice and video: the new face of social engineering
Voice cloning and video deepfakes are now accessible to mid-level threat actors. Real examples and verification protocols.
🚪
Physical Security
Tailgating and physical intrusion: the overlooked attack vector
Physical access is often the easiest path into a network. Why holding the door is a cybersecurity risk.
💥
Data Breach Response
31 ARTICLES🔍
Anatomy
Anatomy of a data breach: from initial click to full exfiltration
A forensic breakdown of how a single phishing click leads to terabytes of data leaving your network over weeks.
⏱️
GDPR
GDPR 72-hour breach notification: a practical guide
What must be reported, to whom, in what timeframe — and how to document your response for regulators.
🕵️
Insider Threat
Insider threat: behavioural indicators and response procedures
When the threat is already inside: how to detect, investigate, and respond to insider-driven data exfiltration.
☁️
Cloud Security
22 ARTICLES🔑
OAuth Phishing
OAuth phishing: stealing cloud access without stealing passwords
Consent phishing grants attackers persistent access to M365 and Google Workspace — without a credential being stolen.
⚙️
Misconfiguration
Cloud misconfiguration: the silent data breach nobody talks about
Misconfigured S3 buckets and Azure storage are the #1 cause of accidental data exposure. A practical audit checklist.
👤
Shadow IT
Shadow IT and SaaS sprawl: the security blind spot in every enterprise
Employees use an average of 28 unsanctioned SaaS tools. Each one is a potential data exfiltration path.
Weekly threat intelligence
The Security Leader Brief
Every Friday: this week's most significant threats, new attack techniques, and what your workforce needs to know. Used by 4,000+ security professionals.