Why threat actors will stick with phishing attacks rather than moving onto move hi-tech attacks?

I really liked this article. I have covered various highly involved cyber attacks over the last few months, deepfakes, hacking cars, airgap attacks but as it describes in this article, you can use technology to steal those credentials or you can just ask nicely for them:

Phishing works so well crims won’t use deepfakes: Sophos • The Register

That is why our online cyber security awareness training is so popular.

Clive Catton MSc (Cyber Security) – by-line and other articles

phishing emails
Cyber Security Experts | Awareness | Training (cyberawake.co.uk)

Further Reading