Most phone numbers found in email threats leveraging the TOAD social engineering technique are Voice over Internet Protocol (VoIP) numbers.
Most phone numbers found in email threats leveraging the TOAD social engineering technique are Voice over Internet Protocol (VoIP) numbers. — This cybersecurity statistic was published by Talos in July 2025. It covers topics including Phishing, TOAD. The original data appears in PDFs: Portable documents, or perfect deliveries for phish? . For the full methodology and detailed findings, refer to the original report.
Share or Copy this stat
Frequently Asked Questions
What does this statistic say?
Most phone numbers found in email threats leveraging the TOAD social engineering technique are Voice over Internet Protocol (VoIP) numbers. This data was published by Talos and covers Phishing, TOAD.
Where does this data come from?
This statistic comes from PDFs: Portable documents, or perfect deliveries for phish? , published by Talos on July 2, 2025. You can view the original report at https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/.
What cybersecurity topics does this cover?
This statistic relates to Phishing, TOAD. Browse more statistics on Phishing or from Talos.