VendorsTalos
Talos
Cybersecurity reports and statistics published by Talos
4 categories1 reports
Research Reports
Reports and publications from Talos
Recent Statistics & Reports
Most phone numbers found in email threats leveraging the TOAD social engineering technique are Voice over Internet Protocol (VoIP) numbers.
7/2/2025•
PhishingTOAD
NortonLifeLock, PayPal, and Geek Squad were among the most impersonated brands in TOAD emails with PDF attachments
7/2/2025•
PhishingTOADPDF
Microsoft and Docusign were among the most frequently impersonated brands in phishing emails with PDF attachments.
7/2/2025•
PhishingTOADPDF
A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, employing Telephone-Oriented Attack Delivery (TOAD) or callback phishing.
7/2/2025•
PhishingTOAD
Phone numbers are sometimes reused on consecutive days in TOAD attacks.
7/2/2025•
PhishingTOAD