How AI Is Supercharging Smishing – and What Can Actually Prevent It

How AI Is Supercharging Smishing – and What Can Actually Prevent It

Feb 18

Team OutThink
Team OutThinkBlogs written by Team OutThink
View Profile

In 2025, nearly 80% of organisations reported experiencing smishing attacks, with incidents rising sharply compared to prior years, making SMS-based phishing the dominant mobile threat. And of course, human behaviour remains the most significant breach contributor in mobile environments, with up to 39% of users in smishing simulations clicking malicious links, even when alerts are raised.

Financial impact? While overall SMS fraud losses peaked at around $80 billion in 2025, industry analysis forecasts a slight decline, around 11%, in 2026 as operators strengthen detection, yet the underlying threat persists.

Smishing isn’t growing because employees are careless, but because SMS-based attacks exploit moments when traditional security controls simply don’t exist: personal devices, the urgency of instant notifications, perceived authority, and human trust. Unlike email, SMS bypasses corporate email gateways and endpoint controls and lands directly in a person’s pocket, where security checks are weakest.

In 2026, preventing smishing is no longer about blocking suspicious messages or teaching red flags once a year. It’s about understanding how people behave under pressure, often on personal devices, outside corporate controls, and intervening before a rushed tap becomes a breach. Traditional awareness fails to measure decision fatigue, distraction, and authority bias, which are key drivers of smishing success.

This article examines why modern smishing works, where controls fail, and how behaviour-driven Human Risk Management, exemplified by OutThink, is emerging as the only scalable defence.

What this blog will help you understand

  • Why smishing succeeds even in organisations that invest heavily in email security and awareness training
  • How modern SMS attacks exploit behavioural gaps, not just technical vulnerabilities
  • Why traditional phishing metrics like click rates fail to measure real smishing risk
  • How AI has made smishing more personalised, scalable, and harder to detect
  • What behavioural signals actually predict SMS-based compromise under pressure
  • How leading security platforms differ in their ability to measure and influence smishing risk
  • Why the future of smishing defence depends on predictive behavioural intelligence, not static training

Smishing Succeeds In the Gaps Between People and Security

In 2025, Google filed a civil lawsuit against a China-linked cybercriminal network dubbed the “Smishing Triad”. The group allegedly ran massive SMS phishing campaigns across more than 120 countries, impersonating trusted brands and targeting millions of victims. That case made one thing very clear: smishing is no longer opportunistic spam. It is organised, industrialised, and financially motivated at scale.

For enterprises, however, the real concern isn’t just the volume of attacks. It’s where these attacks land - in the gaps between corporate security controls and human behaviour.

Smishing works because SMS operates outside the systems that organisations are designed to monitor and defend. Corporate email gateways are highly effective at scanning links, attachments, and suspicious domains, but text messages never pass through those filters. As a result, the organisation’s main phishing controls never come into play. EDR tools are engineered to monitor malware and abnormal activity on laptops and servers, not to analyse incoming SMS content on mobile devices and that leaves a digital blind-spot.

In BYOD environments, MDM solutions often avoid deep inspection of personal text messages for privacy and technical reasons, meaning SMS traffic typically falls outside enforcement policies. At the same time, SOCs rely on logs and telemetry flowing into SIEM platforms. Because SMS delivery and content are rarely integrated into these data streams, attacks often remain invisible until after an employee has clicked a malicious link or approved a fraudulent login request.

This architectural gap explains part of the problem, but technology alone does not make smishing effective. The real advantage begins the moment the message reaches a person.

Modern smishing is psychologically precise. It targets personal devices, like the phones people check first and treat as intimate spaces. Text messages feel immediate and urgent in a way that email rarely does. Attackers amplify this by creating time pressure, such as warning that an account will be locked or a delivery will fail, pushing individuals to prioritise speed over scrutiny.

They also mimic authority and routine. For example, messages appearing to come from “HR,” “IT,” or a trusted bank lower defences, whereas fake MFA prompts, payroll alerts, or delivery updates blend seamlessly into everyday workflows.

Unlike email phishing, smishing captures attention in real time, offers fewer visible verification cues, and triggers reflexive action. It succeeds not because organisations ignore phishing, but because SMS sits outside traditional monitoring frameworks while directly tapping into human habits. Closing that gap requires rethinking both visibility and behaviour and not simply adding another filter.

But understanding where smishing slips through security is only part of the story. To reduce the risk, we first need to understand how modern smishing attacks are actually constructed.

Anatomy of Modern Smishing Attacks

If old-school phishing was largely about spotting a suspicious link or poorly written email, modern smishing is far more refined because it focuses on shaping behaviour rather than merely tricking the eye. Instead of clumsy “click this obvious scam” attempts, today’s SMS-based attacks are carefully engineered around trust, urgency, familiarity, and increasingly, artificial intelligence, making them feel less like threats and more like routine digital interactions.

Modern smishing campaigns may vary in theme, but they consistently rely on a set of repeatable behavioural triggers. Below are the most common formats seen across industries today, each designed not just to trick users, but to guide them toward fast, uncritical action.

  • Impersonation / Brand Spoofing: Attackers send SMS messages posing as trusted entities such as banks, courier companies, telecom providers, or government agencies, using familiar names and branding cues to lower suspicion and collect personal or financial information.
  • Account Suspension / Security Alerts: These messages warn that an account has been locked, compromised, or flagged for suspicious activity, prompting users to “verify” their credentials immediately, often through a fraudulent login page.
  • Missed Delivery / Package Scams: Capitalising on high e-commerce activity, victims receive fake delivery notifications claiming a package is delayed or requires confirmation, with phishing links designed to harvest login or payment details.
  • Prize / Lottery / Reward Scams: Texts claim the recipient has won a prize, cashback, or promotional reward and must click a link to claim it, ultimately exposing sensitive data or payment information.
  • Charity / Donation Scams: Exploiting crises or emotional appeals, these messages request urgent donations or financial support for fabricated or dubious causes, directing victims to fake payment portals.
  • Malware Link Delivery: Instead of credential theft alone, some smishing attacks deliver malicious software through links disguised as updates, security patches, or document downloads, compromising the device itself.
  • Service Cancellation / Renewal Scams: Users are warned that a subscription, utility service, or account will be cancelled unless they update their details immediately, leading them to convincingly cloned websites.
  • QR Code Smishing: Messages include malicious QR codes that redirect users to phishing sites, leveraging the fact that mobile users often scan QR codes without verifying the destination URL beforehand.

How has AI changed smishing

Artificial intelligence has significantly strengthened these tactics because it enables highly localised language that reflects regional tone and cultural context, while also producing polished messages that closely mimic legitimate brand communication styles. Automation further allows attackers to optimise timing, sending messages during busy work hours or moments of fatigue when decision-making is weaker. At scale, AI generates thousands of slight variations of the same message, making pattern-based detection more difficult, and in some cases, smishing is combined with AI-driven voice phishing in multi-stage attacks to reinforce legitimacy.

A defining example of modern smishing at scale is the “0ktapus” campaign, which targeted more than 130 organisations, including Twilio. Employees received SMS messages disguised as routine authentication alerts and were directed to highly convincing fake login portals. When users entered their credentials, attackers captured usernames, passwords, and even multi-factor authentication tokens in real time. Notably, the campaign did not depend on malware or technical exploits; instead, it leveraged trust in familiar workflows such as single sign-on and MFA verification.

The consequences went far beyond a few compromised accounts. Stolen credentials enabled attackers to move laterally within internal systems, access sensitive customer data, and disrupt operations. In Twilio’s case, internal tools and customer-related information were exposed, demonstrating how a single SMS entry point can escalate into significant organisational risk. The real threat lies in the repeatable behavioural pattern that attackers continue to exploit.

When attacks are engineered around behaviour, traditional awareness alone isn’t enough. The real question then becomes: what actually reduces smishing risk in measurable ways?

What Actually Reduces Smishing Risk

If smishing is engineered around human behaviour, then effective prevention must also focus on behaviour. The shift is simple but powerful: instead of only blocking messages, organisations must make user decisions observable, measurable, and influenceable over time. Below are the behavioural levers and KPIs that matter most:

What effective smishing defense measures track

  • Hesitation vs Impulse: The time a user pauses before interacting with a suspicious SMS reflects whether they are engaging critical thinking or reacting automatically. Even a few extra seconds of hesitation can significantly reduce risk.
  • Reporting Speed: How quickly users report suspicious SMS messages directly impacts attacker dwell time. Faster reporting enables quicker containment and reduces the window for exploitation.
  • Near-Miss Patterns: Tracking moments where users almost clicked but stopped reveals early warning signals. These behavioural near-misses help identify rising risk before an actual compromise occurs.
  • Decision Degradation Under Pressure: Measuring how users respond under urgency, authority cues, or time pressure highlights where decision quality weakens and where targeted training is most needed.

The KPIs that matter for Smishing

  • Smishing Failure Rate: The percentage of users who fall for simulated or real smishing attempts, providing a clear indicator of current organisational risk exposure.
  • Reporting Rate: The proportion of suspicious SMS messages that users proactively flag for review, reflecting engagement and awareness levels.
  • Mean Time to Report (MTTR): The average time between receiving a suspicious SMS and reporting it. Shorter MTTR reduces potential damage and attacker access.
  • Behavioural Drift Over Time: Tracking how user responses evolve across multiple campaigns ensures that improvements are sustained and not just short-term gains after a single training effort.

If behaviour is the key risk layer, the next step is evaluating which platforms can truly measure and influence it. Not all smishing protection tools operate at the same depth, and the differences matter.

Comparing Smishing Security Vendors

Most security vendors now claim to support smishing, but that label often hides very different capabilities. Some platforms focus on awareness content, others on phishing simulations, while only a few measure how people actually behave when SMS attacks arrive on personal devices, under time pressure, and outside corporate controls.

For enterprise leaders, the key distinction is whether a platform can observe behaviour, simulate realistic SMS threats, and influence decisions in real moments. The table below compares leading platforms using only smishing-relevant capabilities that materially affect risk:

VendorBehaviour Measurement & AnalyticsAdaptive/Contextual TrainingBest Fit Use Case
OutThinkVery high: human risk & behaviour metrics focused on hesitation, reporting patterns, drift over time, etc.Very high: real-time "nudges" in Teams/Slack and contextual training that adapts to specific user risk signals.Enterprises needing behaviour-centric resilience and risk reduction
Hoxhunt High: adaptive, gamified behavioural learning and reporting ratesHigh: AI-driven adaptive campaigns and micro-training Organisations focused on engagement and measurable behaviour change
KnowBe4Medium: large library with reporting but less deep behaviour signals Medium: broad training modules with some AI enhancements Organisations needing wide awareness coverage and compliance
Proofpoint Medium: integrated with threat intel, analytics tailored to email + behaviourMedium: threat-driven and context-based training recommendations Enterprises with SOC/IR teams and integrated threat intelligence
CofenseMedium-High: rich analytics tied to incident response and reporting workflows Medium: targeted simulations tied to threat intelOrganisations with mature SOC and IR priorities
UsecureMedium: standard SAT analytics with KPI tracking Medium: automated training and remedial flows Small/mid teams needing simpler SAT coverage

OutThink

OutThink positions itself as a human risk management platform rather than a traditional security awareness provider. It focuses heavily on behavioural analytics, reporting patterns, and behavioural drift over time. Instead of delivering static training modules, it adapts interventions based on real user behaviour. The platform is built for enterprises that want measurable reductions in human risk, not just compliance metrics.

Key Points:

  • Deep behavioural risk scoring beyond click rates
  • Tracks reporting trends, and risk drift
  • Adaptive, personalised training interventions
  • Strong executive dashboards focused on human risk
  • Designed for enterprise-scale resilience programs
  • Emphasis on long-term behavioural change


Hoxhunt

Hoxhunt focuses on gamified, adaptive security awareness designed to improve engagement and measurable behaviour change. It combines phishing and smishing simulations with AI-driven micro-learning tailored to each user’s risk level. The platform emphasises positive reinforcement and fast reporting behaviour. It is particularly strong in driving high participation and reporting rates across distributed workforces.

Key Points:

  • Adaptive phishing and smishing simulations
  • Gamified learning to increase engagement
  • AI-driven personalised training paths
  • Strong mobile engagement and reporting UX
  • Measures reporting rate and behavioural improvement
  • Integrates with enterprise email security workflows


KnowBe4

KnowBe4 is one of the largest security awareness providers globally, offering an extensive training library and phishing simulation tools. Its strength lies in broad awareness coverage and compliance-driven programs. While it includes reporting metrics and risk scoring, behavioural analytics are less granular compared to human-risk-focused platforms. It is well-suited for organisations prioritising scale and regulatory alignment.

Key Points:

  • Large content library covering multiple threat types
  • Phishing and limited smishing simulation capabilities
  • Phish Alert reporting button integration
  • Risk scoring and campaign-level reporting
  • Strong compliance and audit alignment
  • Suitable for organisations needing a wide awareness rollout


Proofpoint

Proofpoint integrates security awareness with broader threat intelligence and email protection capabilities. Its strength lies in connecting user training with real-world threat data and SOC workflows. The platform is particularly relevant for enterprises that already rely on Proofpoint’s email security stack. While behaviour analytics are present, the focus remains closely tied to threat-driven detection.

Key Points:

  • Integrated threat intelligence and awareness
  • Context-based training recommendations
  • PhishAlarm reporting integration
  • Strong SOC and incident response alignment
  • Email-centric with behavioural insights
  • Suitable for mature enterprise security teams


Cofense

Cofense focuses on phishing detection, reporting, and incident response workflows. Its platform is designed to turn employee reports into actionable intelligence for SOC teams. While it includes simulations and analytics, its core strength lies in operationalising user reporting within security operations. It fits organisations prioritising rapid triage and response.

Key Points:

  • Strong reporting-to-SOC integration
  • Incident response workflow automation
  • Threat intelligence-driven simulations
  • Analytics tied to reporting behaviour
  • Supports mature SOC environments
  • Emphasis on reducing attacker dwell time


Usecure

Usecure offers streamlined security awareness training with automated campaigns and KPI tracking. It is designed for small to mid-sized organisations seeking structured yet simple programs. While behavioural analytics are more standardised, it provides clear reporting dashboards and automated remediation flows. The platform prioritises ease of deployment and operational simplicity.

Key Points:

  • Automated phishing and awareness campaigns
  • Standard KPI tracking and reporting dashboards
  • Remedial training workflows
  • Suitable for smaller security teams
  • Easy deployment and management
  • Baseline coverage across phishing and smishing threats

The Future of Smishing Defences is Prediction

Smishing prevention is shifting from reaction to prediction. Earlier, organisations mainly measured results like who clicked on a malicious link or who reported a suspicious message. While that data is useful, it only tells you what has already failed. The bigger question now is: can we identify who is more likely to fall for an attack under pressure?

Behavioural risk scoring is becoming a continuous early-warning system. Instead of relying on training completion or single campaign results, organisations analyse patterns such as hesitation before clicking, reporting consistency, susceptibility under urgency, and behavioural drift over time. These signals help identify users who may be more vulnerable when pressure, authority cues, or routine workflows are involved.

Importantly, these insights are beginning to influence real security controls rather than remaining static dashboard metrics. Identity and authentication systems can apply step-up verification when behaviour suggests elevated risk. High-value or sensitive transactions can trigger additional confirmation if activity appears behaviourally unusual. Security Operations Centres can prioritise alerts linked to users with higher behavioural risk, improving triage speed and reducing potential impact.

The objective is not flawless human behaviour, which is unrealistic under time pressure. The goal is earlier detection and faster containment. Smishing isn’t defeated when people simply know more. It’s mitigated when systems understand behaviour patterns and intervene before risk escalates.

Sources

  1. https://zipdo.co/smishing-statistics/
  2. https://www.verizon.com/business/resources/T550/reports/2025-mobile-security-index.pdf
  3. https://www.infosecurity-magazine.com/news/sms-fraud-losses-set-to-decline-11
  4. https://spacelift.io/blog/social-engineering-statistics?utm_source=chatgpt.com
  5. https://comparecheapssl.com/100-social-engineering-statistics-in-2025-the-latest-stats-and-trends-revealed
  6. https://timesofindia.indiatimes.com/technology/tech-news/google-sues-china-based-hacking-group-says-misusing-big-brands-including-e-zpass-google-and-others-to-trap-users/articleshow/125272783.cms?utm_source=chatgpt.com
  7. https://abnormal.ai/blog/email-threats-bypassing-segs
  8. https://blog.kaymera.com/industry-news-and-articles/why-traditional-edr-falls-short-on-protecting-mobile-devices
  9. https://1password.com/blog/mdm-vs-device-trust-technical-limitations
  10. https://www.exabeam.com/explainers/siem-security/the-soc-secops-and-siem/
  11. https://blog.cleanfox.io/why-are-smishing-attacks-particularly-effective-in-2025/?utm_source=chatgpt.com
  12. https://wifitalents.com/smishing-statistics/?utm_source=chatgpt.com
  13. https://spacelift.io/blog/social-engineering-statistics?utm_source=chatgpt.com
  14. https://keepnetlabs.com/blog/the-most-spoofed-brands-in-sms-phishing-protect-your-business-in-2025?utm_source=chatgpt.com
  15. https://blog.cleanfox.io/why-are-smishing-attacks-particularly-effective-in-2025/?utm_source=chatgpt.com
  16. https://www.telewire-inc.com/cybersecurity/why-are-smishing-attacks-particularly-effective/?utm_source=chatgpt.com
  17. https://www.bitdefender.com/en-au/blog/hotforsecurity/twilio-reveals-hackers-compromised-its-systems-a-month-earlier-than-previously-thought
Share

Experience OutThink

Related Articles
Security Awareness vs Secure Behaviour: Why Training Fails and What Actually Reduces Human Cyber Risk
Team OutThink
04/03/2026

Security Awareness vs Secure Behaviour: Why Training Fails and What Actually Reduces Human Cyber Risk

Read More about AI-Native Cybersecurity Human Risk Management
Shadow AI and Human‑Driven GenAI Risk: Why Organisations Need Human‑Centric AI Governance in 2026
Team OutThink
28/02/2026

Shadow AI and Human‑Driven GenAI Risk: Why Organisations Need Human‑Centric AI Governance in 2026

Read More about AI-Native Cybersecurity Human Risk Management
How Security Behaviour & Culture Programs (SBCP) Actually Change Cybersecurity Outcomes
Team OutThink
27/02/2026

How Security Behaviour & Culture Programs (SBCP) Actually Change Cybersecurity Outcomes

Read More about AI-Native Cybersecurity Human Risk Management
How to Spot AI‑Generated Videos: Why Detection Now Depends on Human Judgement, Not Visual Clues
Team OutThink
25/02/2026

How to Spot AI‑Generated Videos: Why Detection Now Depends on Human Judgement, Not Visual Clues

Read More about AI-Native Cybersecurity Human Risk Management
Human-Centric Cybersecurity: Why Secure Behaviour Is the New Security Perimeter
Team OutThink
24/02/2026

Human-Centric Cybersecurity: Why Secure Behaviour Is the New Security Perimeter

Read More about AI-Native Cybersecurity Human Risk Management
What Makes a Human Risk Management Platform Effective in 2026
Team OutThink
20/02/2026

What Makes a Human Risk Management Platform Effective in 2026

Read More about AI-Native Cybersecurity Human Risk Management
How AI Is Supercharging Smishing – and What Can Actually Prevent It
Team OutThink
18/02/2026

How AI Is Supercharging Smishing – and What Can Actually Prevent It

Read More about AI-Native Cybersecurity Human Risk Management
Behaviour vs Recognition: The Real Skills Security Awareness Training Must Build for Effective Cyber Resilience
Team OutThink
12/02/2026

Behaviour vs Recognition: The Real Skills Security Awareness Training Must Build for Effective Cyber Resilience

Read More about AI-Native Cybersecurity Human Risk Management
Beyond Detection: The New Model for Deepfake Awareness Training
Team OutThink
09/02/2026

Beyond Detection: The New Model for Deepfake Awareness Training

Read More about AI-Native Cybersecurity Human Risk Management
Deepfake Phishing Simulations: The New Battleground for Cybersecurity Teams
Team OutThink
02/02/2026

Deepfake Phishing Simulations: The New Battleground for Cybersecurity Teams

Read More about AI-Native Cybersecurity Human Risk Management
Why Most Phishing Training Programs Fail - And the Best Phishing Simulation Tools to Turn Them Around
Team OutThink
23/01/2026

Why Most Phishing Training Programs Fail - And the Best Phishing Simulation Tools to Turn Them Around

Read More about AI-Native Cybersecurity Human Risk Management
GenAI and the Illusion of Control: Why Enterprise Software Is Quietly Undermining Data Security
Markus Sanio
20/01/2026

GenAI and the Illusion of Control: Why Enterprise Software Is Quietly Undermining Data Security

Read More about AI-Native Cybersecurity Human Risk Management
2026 Ultimate Guide to AI Security Training Platforms & Tools
Team OutThink
20/01/2026

2026 Ultimate Guide to AI Security Training Platforms & Tools

Read More about AI-Native Cybersecurity Human Risk Management
The Best Proofpoint Alternatives & Competitors in 2026: What to Choose (and Why)
Team OutThink
06/01/2026

The Best Proofpoint Alternatives & Competitors in 2026: What to Choose (and Why)

Read More about AI-Native Cybersecurity Human Risk Management
The Best Adaptive Security Alternatives & Competitors in 2026
Team OutThink
31/12/2025

The Best Adaptive Security Alternatives & Competitors in 2026

Read More about AI-Native Cybersecurity Human Risk Management
The Best Hoxhunt Alternatives & Competitors in 2026
Team OutThink
28/12/2025

The Best Hoxhunt Alternatives & Competitors in 2026

Read More about AI-Native Cybersecurity Human Risk Management
The Best KnowBe4 Alternatives & Competitors in 2026: What to Choose (and Why)
Team OutThink
25/12/2025

The Best KnowBe4 Alternatives & Competitors in 2026: What to Choose (and Why)

Read More about AI-Native Cybersecurity Human Risk Management
The Best MetaCompliance Alternatives & Competitors  in 2026
Team OutThink
22/12/2025

The Best MetaCompliance Alternatives & Competitors in 2026

Read More about AI-Native Cybersecurity Human Risk Management
The Best SANS Security Awareness Alternatives & Competitors in 2026
Team OutThink
22/12/2025

The Best SANS Security Awareness Alternatives & Competitors in 2026

Read More about AI-Native Cybersecurity Human Risk Management
The Best Infosec IQ Alternatives & Competitors  in 2026
Team OutThink
22/12/2025

The Best Infosec IQ Alternatives & Competitors in 2026

Read More about AI-Native Cybersecurity Human Risk Management
The Best Cofense Alternatives & Competitors  in 2026
Team OutThink
22/12/2025

The Best Cofense Alternatives & Competitors in 2026

Read More about AI-Native Cybersecurity Human Risk Management
The Best Mimecast Alternatives & Competitors  in 2026
Team OutThink
22/12/2025

The Best Mimecast Alternatives & Competitors in 2026

Read More about AI-Native Cybersecurity Human Risk Management
Designing Human-Centric Cybersecurity
Markus Sanio
01/12/2025

Designing Human-Centric Cybersecurity

Read More about AI-Native Cybersecurity Human Risk Management
Beyond Tools - The Human Factor in Cybersecurity
Markus Sanio
01/12/2025

Beyond Tools - The Human Factor in Cybersecurity

Read More about AI-Native Cybersecurity Human Risk Management
The Misaligned Incentives of Cybersecurity : Lessons from Healthcare
Markus Sanio
26/11/2025

The Misaligned Incentives of Cybersecurity : Lessons from Healthcare

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management and ISO 27001
Gry Evita Sivertsen
31/10/2025

Human Risk Management and ISO 27001

Read More about AI-Native Cybersecurity Human Risk Management
There are (at least) Three Ways You Should be doing SAT Campaigns Differently (Part 2)
Rory Attwood
27/09/2025

There are (at least) Three Ways You Should be doing SAT Campaigns Differently (Part 2)

Read More about AI-Native Cybersecurity Human Risk Management
There are (at least) Three Ways You Should be doing SAT Campaigns Differently (Part 1)
Rory Attwood
12/09/2025

There are (at least) Three Ways You Should be doing SAT Campaigns Differently (Part 1)

Read More about AI-Native Cybersecurity Human Risk Management
Slid into my DMs: The rise of AI Phishing Influencers
Olivia Debroy
18/08/2025

Slid into my DMs: The rise of AI Phishing Influencers

Read More about AI-Native Cybersecurity Human Risk Management
Beyond Passwords: Inside the Largest Credential Leak in History
Olivia Debroy
04/08/2025

Beyond Passwords: Inside the Largest Credential Leak in History

Read More about AI-Native Cybersecurity Human Risk Management
Practical Guide to COM-B
Andy Wood
25/07/2025

Practical Guide to COM-B

Read More about AI-Native Cybersecurity Human Risk Management
Building the Foundation: The Crucial Role of Security Culture in Today's Organizations
Andy Wood
18/07/2025

Building the Foundation: The Crucial Role of Security Culture in Today's Organizations

Read More about AI-Native Cybersecurity Human Risk Management
How to Build and Sustain a Successful Security Champions Program
Andy Wood
11/07/2025

How to Build and Sustain a Successful Security Champions Program

Read More about AI-Native Cybersecurity Human Risk Management
It’s Time to Make Peace With Imperfection in Cybersecurity Human Risk Management
Thea Mannix
27/06/2025

It’s Time to Make Peace With Imperfection in Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Why I Refused to Say “People Are the Weakest Link in Cyber”
Jane Frankland
26/06/2025

Why I Refused to Say “People Are the Weakest Link in Cyber”

Read More about AI-Native Cybersecurity Human Risk Management
Can Your People Outthink a Deepfake?
Olivia Debroy
19/06/2025

Can Your People Outthink a Deepfake?

Read More about AI-Native Cybersecurity Human Risk Management
Trusting HTTPS Could Be Your Biggest Mistake - Here’s Why
Olivia Debroy
16/06/2025

Trusting HTTPS Could Be Your Biggest Mistake - Here’s Why

Read More about AI-Native Cybersecurity Human Risk Management
The Human Risk Behind Scareware Attacks
Olivia Debroy
13/06/2025

The Human Risk Behind Scareware Attacks

Read More about AI-Native Cybersecurity Human Risk Management
Why Whaling Attacks Are the Caviar of Cybercrime
Olivia Debroy
10/06/2025

Why Whaling Attacks Are the Caviar of Cybercrime

Read More about AI-Native Cybersecurity Human Risk Management
Biometrics Are Here: Are We Ready for the Human Risks?
Olivia Debroy
06/06/2025

Biometrics Are Here: Are We Ready for the Human Risks?

Read More about AI-Native Cybersecurity Human Risk Management
I’m a Human Risk Manager (I Think?)
John Scott
03/06/2025

I’m a Human Risk Manager (I Think?)

Read More about AI-Native Cybersecurity Human Risk Management
How Microsoft’s ‘Passwordless by Default’ Might Save Security
Olivia Debroy
28/05/2025

How Microsoft’s ‘Passwordless by Default’ Might Save Security

Read More about AI-Native Cybersecurity Human Risk Management
The Cyber Risk Within: Insider Threats
Olivia Debroy
26/05/2025

The Cyber Risk Within: Insider Threats

Read More about AI-Native Cybersecurity Human Risk Management
What Is ‘Human Risk’ in Cyber?
Olivia Debroy
22/05/2025

What Is ‘Human Risk’ in Cyber?

Read More about AI-Native Cybersecurity Human Risk Management
What if Agentic AI Could Stop Human Risks Before They Happen?
Olivia Debroy
19/05/2025

What if Agentic AI Could Stop Human Risks Before They Happen?

Read More about AI-Native Cybersecurity Human Risk Management
How to Run a Cybersecurity Awareness Training Program in Academia
Ravi Miranda
15/05/2025

How to Run a Cybersecurity Awareness Training Program in Academia

Read More about AI-Native Cybersecurity Human Risk Management
Phishing in 2025: Cybercriminals Are Smarter Than You Know
Olivia Debroy
14/05/2025

Phishing in 2025: Cybercriminals Are Smarter Than You Know

Read More about AI-Native Cybersecurity Human Risk Management
Why Cybersecurity Human Risk Management Benefits CISOs
Gry Evita Sivertsen
29/04/2025

Why Cybersecurity Human Risk Management Benefits CISOs

Read More about AI-Native Cybersecurity Human Risk Management
The Strategic Role of Adaptive Security Awareness Training Content
Roberto Ishmael Pennino
21/04/2025

The Strategic Role of Adaptive Security Awareness Training Content

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity's Comfort Zone Problem
Jane Frankland
15/04/2025

Cybersecurity's Comfort Zone Problem

Read More about AI-Native Cybersecurity Human Risk Management
Turning Employees into Payment Security Champions: Your Guide to Free PCI Awareness Training
Roberto Ishmael Pennino
11/04/2025

Turning Employees into Payment Security Champions: Your Guide to Free PCI Awareness Training

Read More about AI-Native Cybersecurity Human Risk Management
AI Phishing: The Rising Threat of Intelligent Cyber Deception
Roberto Ishmael Pennino
02/04/2025

AI Phishing: The Rising Threat of Intelligent Cyber Deception

Read More about AI-Native Cybersecurity Human Risk Management
What Maslow’s Hierarchy of Needs Reveals About Cybersecurity Flaws
Jane Frankland
01/04/2025

What Maslow’s Hierarchy of Needs Reveals About Cybersecurity Flaws

Read More about AI-Native Cybersecurity Human Risk Management
Smishing: The Phishing Attack That Lives in Your Pocket
Roberto Ishmael Pennino
24/03/2025

Smishing: The Phishing Attack That Lives in Your Pocket

Read More about AI-Native Cybersecurity Human Risk Management
How Adaptive Security Awareness Training Drives Better Cybersecurity Outcomes: The Science
Rory Attwood
11/03/2025

How Adaptive Security Awareness Training Drives Better Cybersecurity Outcomes: The Science

Read More about AI-Native Cybersecurity Human Risk Management
Quishing: When QR Codes Become Cyber Traps - Your Essential Guide to Protection
Roberto Ishmael Pennino
10/03/2025

Quishing: When QR Codes Become Cyber Traps - Your Essential Guide to Protection

Read More about AI-Native Cybersecurity Human Risk Management
Domain Spoofing: The Cyber Trick You Can’t Afford to Ignore
Roberto Ishmael Pennino
10/03/2025

Domain Spoofing: The Cyber Trick You Can’t Afford to Ignore

Read More about AI-Native Cybersecurity Human Risk Management
PIPEDA Compliance: Why PIPEDA Training is Important
Roberto Ishmael Pennino
21/02/2025

PIPEDA Compliance: Why PIPEDA Training is Important

Read More about AI-Native Cybersecurity Human Risk Management
CCPA Training: Building a Culture of Privacy and Compliance
Roberto Ishmael Pennino
10/02/2025

CCPA Training: Building a Culture of Privacy and Compliance

Read More about AI-Native Cybersecurity Human Risk Management
Data Privacy Week: How Convention 108 Paved the Way for Modern Privacy Laws
Roberto Ishmael Pennino
31/01/2025

Data Privacy Week: How Convention 108 Paved the Way for Modern Privacy Laws

Read More about AI-Native Cybersecurity Human Risk Management
TISAX Training: Strengthening Automotive Information Security and Compliance
Roberto Ishmael Pennino
27/01/2025

TISAX Training: Strengthening Automotive Information Security and Compliance

Read More about AI-Native Cybersecurity Human Risk Management
GDPR Training: Building a Culture of Compliance
Roberto Ishmael Pennino
20/01/2025

GDPR Training: Building a Culture of Compliance

Read More about AI-Native Cybersecurity Human Risk Management
What Is DORA? DORA Training for Compliance
Dr. Charlotte Jupp
20/01/2025

What Is DORA? DORA Training for Compliance

Read More about AI-Native Cybersecurity Human Risk Management
Risk Quantification for Cybersecurity Human Risk Management
Lev Lesokhin
13/12/2024

Risk Quantification for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive SAT: The Future Is Now
Roberto Ishmael Pennino
12/11/2024

Adaptive SAT: The Future Is Now

Read More about AI-Native Cybersecurity Human Risk Management
NIST Recommends New Guidelines for Password Security
Roberto Ishmael Pennino
11/11/2024

NIST Recommends New Guidelines for Password Security

Read More about AI-Native Cybersecurity Human Risk Management
Empowering Organizations with Adaptive Security Awareness Training
Roberto Ishmael Pennino
07/11/2024

Empowering Organizations with Adaptive Security Awareness Training

Read More about AI-Native Cybersecurity Human Risk Management
Why Humans Should Be the New Frontline in Cyber Defense
Roberto Ishmael Pennino
06/11/2024

Why Humans Should Be the New Frontline in Cyber Defense

Read More about AI-Native Cybersecurity Human Risk Management
Behavioral Analytics Are Changing Cybersecurity
Roberto Ishmael Pennino
04/11/2024

Behavioral Analytics Are Changing Cybersecurity

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Awareness Month 2024: Your Security Journey Doesn't End Here
Roberto Ishmael Pennino
01/11/2024

Cybersecurity Awareness Month 2024: Your Security Journey Doesn't End Here

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Awareness Training for Remote Workforces
Roberto Ishmael Pennino
25/10/2024

Cybersecurity Awareness Training for Remote Workforces

Read More about AI-Native Cybersecurity Human Risk Management
Would You Skip an Update if You Knew What It Could Cost You?
Roberto Ishmael Pennino
24/10/2024

Would You Skip an Update if You Knew What It Could Cost You?

Read More about AI-Native Cybersecurity Human Risk Management
Why Every Cyber Strategy Fails Without This Element
Roberto Ishmael Pennino
22/10/2024

Why Every Cyber Strategy Fails Without This Element

Read More about AI-Native Cybersecurity Human Risk Management
Your Password Isn't Enough: Why Your Digital Life Needs Multifactor Authentication Today
Roberto Ishmael Pennino
21/10/2024

Your Password Isn't Enough: Why Your Digital Life Needs Multifactor Authentication Today

Read More about AI-Native Cybersecurity Human Risk Management
Is Your Cybersecurity Working From Home Too?
Roberto Ishmael Pennino
18/10/2024

Is Your Cybersecurity Working From Home Too?

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management Gets Adaptive
Lev Lesokhin
08/10/2024

Human Risk Management Gets Adaptive

Read More about AI-Native Cybersecurity Human Risk Management
Your Cybersecurity Is Only as Strong as Your People
Roberto Ishmael Pennino
08/10/2024

Your Cybersecurity Is Only as Strong as Your People

Read More about AI-Native Cybersecurity Human Risk Management
The Email That Could Cost You Everything: Your Essential Guide to Recognizing Phishing in 2024
Roberto Ishmael Pennino
07/10/2024

The Email That Could Cost You Everything: Your Essential Guide to Recognizing Phishing in 2024

Read More about AI-Native Cybersecurity Human Risk Management
How Ready Is Your Workforce for a Real Phishing Attack?
Roberto Ishmael Pennino
01/10/2024

How Ready Is Your Workforce for a Real Phishing Attack?

Read More about AI-Native Cybersecurity Human Risk Management
What is Cybersecurity Human Risk Management? What You Need to Know
Lev Lesokhin
23/09/2024

What is Cybersecurity Human Risk Management? What You Need to Know

Read More about AI-Native Cybersecurity Human Risk Management
Engagement Strategies for Cybersecurity Human Risk Management
Lev Lesokhin
16/08/2024

Engagement Strategies for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Enhance Your Phishing Training With Outthink
Lavinia Manocha
02/08/2024

Enhance Your Phishing Training With Outthink

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training for Frontline Workers
Lavinia Manocha
26/07/2024

Adaptive Security Awareness Training for Frontline Workers

Read More about AI-Native Cybersecurity Human Risk Management
The Role of Security Awareness Training After IT Outages
Lev Lesokhin
26/07/2024

The Role of Security Awareness Training After IT Outages

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management's Eight Dimensions of Secure Behavior Segmentation
Lev Lesokhin
25/07/2024

Human Risk Management's Eight Dimensions of Secure Behavior Segmentation

Read More about AI-Native Cybersecurity Human Risk Management
State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business
Lev Lesokhin
18/07/2024

State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training: Unlearning and Relearning Routines
Lev Lesokhin
10/07/2024

Adaptive Security Awareness Training: Unlearning and Relearning Routines

Read More about AI-Native Cybersecurity Human Risk Management
Did You Think Your Password Was Secure? Let’s Talk Password Security
Lev Lesokhin
24/05/2024

Did You Think Your Password Was Secure? Let’s Talk Password Security

Read More about AI-Native Cybersecurity Human Risk Management
Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework
Lev Lesokhin
23/05/2024

Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework

Read More about AI-Native Cybersecurity Human Risk Management
Password Security: Why the UK is Banning Generic Passwords
Lev Lesokhin
17/05/2024

Password Security: Why the UK is Banning Generic Passwords

Read More about AI-Native Cybersecurity Human Risk Management
Instagram Security Awareness Training: A Step-by-Step Guide
Lev Lesokhin
10/05/2024

Instagram Security Awareness Training: A Step-by-Step Guide

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Human Risk Management Forum Kicks Off in London
Lev Lesokhin
18/04/2024

Cybersecurity Human Risk Management Forum Kicks Off in London

Read More about AI-Native Cybersecurity Human Risk Management
Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step
Rory Attwood
31/01/2024

Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step

Read More about AI-Native Cybersecurity Human Risk Management