<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Phishing | VirtualDoers</title>
	<atom:link href="https://virtualdoers.com/category/phishing/feed/" rel="self" type="application/rss+xml" />
	<link>https://virtualdoers.com</link>
	<description>AI Infused Cybersecurity Awareness Training</description>
	<lastBuildDate>Wed, 06 Dec 2023 03:15:53 +0000</lastBuildDate>
	<language>en-CA</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://virtualdoers.com/wp-content/uploads/2022/04/modified_logo_only-150x150.ico</url>
	<title>Phishing | VirtualDoers</title>
	<link>https://virtualdoers.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Beware of Christmas phishing: 10 Protection Tips</title>
		<link>https://virtualdoers.com/beware-of-christmas-phishing-10-protection-tips/</link>
					<comments>https://virtualdoers.com/beware-of-christmas-phishing-10-protection-tips/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Wed, 06 Dec 2023 03:15:52 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1752</guid>

					<description><![CDATA[&#8220;Christmas phishing&#8221; refers to a type of phishing attack that specifically leverages the holiday season and Christmas-related themes to deceive individuals and trick them into divulging sensitive information or taking malicious actions. During the festive season, as the joy of Christmas spreads across digital landscapes, it is crucial for individuals to be acutely aware of [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/beware-of-christmas-phishing-10-protection-tips/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>10 Reasons Why Cybersecurity Matters in Our Digital World</title>
		<link>https://virtualdoers.com/10-reasons-why-cybersecurity-matters/</link>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Sun, 19 Nov 2023 04:02:10 +0000</pubDate>
				<category><![CDATA[Insider Threats]]></category>
		<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1618</guid>

					<description><![CDATA[Join me on this journey as we unravel the layers of why cybersecurity matters, exploring the profound impact it has on our digital lives and beyond.]]></description>
		
		
		
			</item>
		<item>
		<title>Catfishing 7 Powerful Tips on How Not to Fall Prey</title>
		<link>https://virtualdoers.com/catfishing-10-key-tips-on-how-not-to-fall-prey/</link>
					<comments>https://virtualdoers.com/catfishing-10-key-tips-on-how-not-to-fall-prey/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Thu, 09 Nov 2023 06:20:00 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1560</guid>

					<description><![CDATA[In this guide, we'll delve into the art of recognizing romantic catfishing and equip you with strategies to avoid falling into its web of deceit.]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/catfishing-10-key-tips-on-how-not-to-fall-prey/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Recognizing Phishing Emails: A Guide to Spotting Suspicious Messages</title>
		<link>https://virtualdoers.com/efficient-guide-to-recognizing-phishing-emails/</link>
					<comments>https://virtualdoers.com/efficient-guide-to-recognizing-phishing-emails/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Wed, 08 Nov 2023 06:16:00 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1531</guid>

					<description><![CDATA[In this comprehensive phishing emails guide, we will explore the red flags and best practices to spot and avoid falling victim to phishing attacks.]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/efficient-guide-to-recognizing-phishing-emails/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>6 Important Cybersecurity Threats Explained: What You Need to Know</title>
		<link>https://virtualdoers.com/the-6-important-cybersecurity-threats-to-know/</link>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Sat, 04 Nov 2023 16:37:59 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Insider Threats]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1495</guid>

					<description><![CDATA[Cybersecurity threats are activities intended to compromise&#160;&#160;the security of an information system by altering the availability&#160;, integrity&#160;, or confidentiality&#160;&#160;of a system or the information it contains, or to disrupt digital life in general. The&#160;cyber threat environment&#160;is the online space where cyber threat actors conduct malicious cyber threat activity. It includes the networks, devices, and processes [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>5 Powerful Tips to Boost your last line of defense and Security Posture</title>
		<link>https://virtualdoers.com/5-great-tips-to-boost-your-last-line-of-defense/</link>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Thu, 15 Dec 2022 02:48:35 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1405</guid>

					<description><![CDATA[Companies, regardless of their size, are target to cyber-attacks, after all, you simply need to check the news to realize how serious of a problem it has become. According to Varonis, 2021 saw a near 50% increase in the number of weekly attacks compared to 2020, while the average cost of data breaches rose to [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Callback phishing attacks: 3 Great Detection Tips</title>
		<link>https://virtualdoers.com/callback-phishing-attacks-3-great-detection-tips/</link>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Fri, 19 Aug 2022 01:42:02 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1371</guid>

					<description><![CDATA[Callback phishing is a specialized type of cyber-security email threat. In a Callback phishing attack, cyber-criminals attempt to impersonate a business through an email or a phone call to a target recipient claiming that a transaction initiated by the recipient has been successfully completed. The recipient is then advised to call on the provided phone [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>DLL Hijacking Attack &#8211; 3 recent use cases</title>
		<link>https://virtualdoers.com/dll-hijacking-attack-3-recent-use-cases/</link>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Mon, 01 Aug 2022 17:23:02 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1195</guid>

					<description><![CDATA[DLL hijacking is a devastating attack method that takes&#160;advantage of how Dynamic Link Libraries (DLLs) are handled in Windows. It consists of creating a malicious version of a legitimate DLL required by the program and placing it early in the search order used to find a required DLL.&#160; This folder is commonly the same folder [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Working From Home: 10 Easy Ways to Protect Yourself and your Organizationd</title>
		<link>https://virtualdoers.com/working-from-home-10-important-safety-tips/</link>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Thu, 07 Jul 2022 01:24:40 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1173</guid>

					<description><![CDATA[Since the pandemic, working from home has become much more widespread worldwide and many companies around the world have embraced both remote and flexible ways of working. As the pandemic fades, many predict that remote working will remain prevalent across multiple sectors. It’s no secret that working from home or remote work is convenient and [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>12 Types of Phishing Attacks your Organization should be Aware of</title>
		<link>https://virtualdoers.com/12-types-of-phishing-attacks-your-organization-should-be-aware-of/</link>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Thu, 07 Jul 2022 00:05:26 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1171</guid>

					<description><![CDATA[Phishing attacks range from classic email phishing schemes to more inventive approaches such as spear phishing and smishing. All have the same purpose – to steal your personal details. With a better understanding of the twelve types of phishing attacks and how to identify them, organizations can protect their users and their data more effectively. [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
