Fortra’s 2025 Email Threat Report: Standard Security Measures Fall Short.

Introduction: Growing Email Threats in 2025.

Fortra’s 2025 Email Threat Intelligence Report shows a drastic rise in sophisticated email-based attacks. Conventional security measures are found to be insufficient against these changing threats. Organizations need to evolve to secure their systems and data efficiently.​

Homepage

Domination of Social Engineering Attacks.

The report examined more than one million unblocked email threats in 2024. The results indicate that 99% of the threats were social engineering attacks or had phishing links. Just 1% contained malware directly. This means that attackers are changing tactics to evade traditional email defenses.​

Rise of Multichannel Phishing Techniques.

Cyber attackers are now using plain emails with phone numbers and QR codes to trick victims more often. The messages lead the users to less secure environments, where it becomes easier to exploit them. These multichannel attacks are hard to detect as they contain basic content.​

Exploitation of Trusted Tools and Services.

There has been a 200% rise in the abuse of developer tools and legitimate services such as eSignature platforms. These trusted infrastructures are exploited by attackers to conduct phishing attacks, which become harder to detect. Unless there are proactive steps taken by service providers, this abuse is likely to expand.​

The Role of Generative AI in Phishing.

Fortra anticipates that attackers will improve their attacks through the use of generative AI. AI can mimic known personalities and imitate speech patterns, making phishing more credible. This advancement is a serious threat to current security controls.

Recommendations for Organizations
  • Strengthen Email Security: Deploy advanced email security tools capable of identifying and preventing sophisticated phishing attacks.
  • Employee Training: Train personnel on identifying and reporting suspicious emails, such as those containing QR codes or strange links.​
  • Track Trusted Services: Periodically check the use of developer tools and third-party services to identify potential misuses.​
  • Implement AI-Based Defenses: Employ AI-powered security tools to recognize and counteract evolving threats in an effective manner.​
Conclusion: Adapting to Evolving Threats.

The email threat landscape is constantly changing, and the attackers use more advanced attacks. Basic security practices are now inadequate. It is necessary for organizations to become proactive and extensive in their email security. It involves using enhanced technologies and regular employee training in order to ward off threats.

Must Read

Thales and Google Cloud Reinforce Digital Security at Google Next 2025.

Introduction. At Google Next 2025, Google Cloud and Thales demonstrated...

SAP NetWeaver Zero-Day Vulnerability Needs Emergency Patch.

Introduction: A Grave Security Risk. Visual Composer of SAP NetWeaver...

NAVEX’s Carrie Penman to Speak at Compliance Week’s 20th Anniversary National Conference

Portland, Ore. – April 9, 2025 – For two decades,...

The Vitality of Being an In-Person Cybersecurity Vendor at Cybersecurity Conferences

President of the Cyber Security Summit & TECHEXPO Divisions |...

Topics

Thales and Google Cloud Reinforce Digital Security at Google Next 2025.

Introduction. At Google Next 2025, Google Cloud and Thales demonstrated...

SAP NetWeaver Zero-Day Vulnerability Needs Emergency Patch.

Introduction: A Grave Security Risk. Visual Composer of SAP NetWeaver...

The Vitality of Being an In-Person Cybersecurity Vendor at Cybersecurity Conferences

President of the Cyber Security Summit & TECHEXPO Divisions |...

EU Proceeds with Rollout of Biometric Border Control.

A New Era for Border Security. The European Union is...

CFOs Spearhead the Digital Revolution in B2B Payments.

Introduction. CFO role in B2B payments landscape is undergoing rapid...

TekStream Featured in Gartner’s 2025 Guide for Co-Managed Security Services.

A Significant Achievement for TekStream. TekStream has been included in...

Related Articles

Popular Tags