{"id":28075,"date":"2026-03-24T01:00:41","date_gmt":"2026-03-23T17:00:41","guid":{"rendered":"https:\/\/bigband.net.my\/?p=28075"},"modified":"2026-03-18T18:02:29","modified_gmt":"2026-03-18T10:02:29","slug":"ai-phishing-why-your-staff-cannot-tell-fake-from-real-anymore","status":"publish","type":"post","link":"https:\/\/bigband.net.my\/index.php\/2026\/03\/24\/ai-phishing-why-your-staff-cannot-tell-fake-from-real-anymore\/","title":{"rendered":"AI Phishing: Why Your Staff Cannot Tell Fake from Real Anymore."},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#0060ae&#8221; header_font_size=&#8221;50px&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;40px||0px||false|false&#8221; custom_margin_phone=&#8221;20px||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;46px&#8221; header_font_size_phone=&#8221;40px&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<h1><span style=\"color: #ff0000;\"><b>AI Phishing:<br \/><\/b><\/span><b>Why Your Staff Cannot Tell Fake from Real Anymore.<\/b><\/h1>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;20px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;20px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<h2 style=\"text-align: center;\"><em><b>The email looks real. The voice sounds familiar. The video call seems genuine. In 2025 and 2026, none of these are guarantees.<\/b><\/em><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;60px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;40px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<h2><b>\ud83d\udea8 A Wire Transfer Your CFO Never Approved<\/b><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|20px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"font-weight: 400;\">It is a regular Tuesday afternoon. Your accounts executive receives a WhatsApp message from what appears to be the CEO&#8217;s number. The profile photo matches. The name matches. The writing style matches. The message reads: I am in a meeting and cannot call. Please process an urgent payment of RM800,000 to this new vendor account. I will explain later. Time sensitive.<\/p>\n<p style=\"font-weight: 400;\">She hesitates for a moment, then transfers the funds. The vendor account belongs to a criminal. The CEO was never involved. The message was generated by AI, trained on months of the CEO&#8217;s past communications, social media posts, and voice recordings scraped from a company webinar.<\/p>\n<p style=\"font-weight: 400;\"><strong>This exact scenario played out at a Kuala Lumpur finance firm in 2025, according to the SimplyData Malaysia Cybersecurity Threat Report 2026. RM800,000 was transferred before the fraud was detected. By then, the money was gone.<\/strong><\/p>\n<p style=\"font-weight: 400;\">Welcome to the new era of AI-powered phishing, where the threat is no longer a poorly written email from a foreign prince. It is a message, call, or video that sounds and looks exactly like someone you trust.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;20px||20px||false|false&#8221; custom_padding=&#8221;20px||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; header_2_line_height=&#8221;1em&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;60px&#8221; header_3_line_height=&#8221;1em&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;40px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_3_font_size_phone=&#8221;60px&#8221; header_3_font_size_last_edited=&#8221;off|phone&#8221; header_3_line_height_tablet=&#8221;1em&#8221; header_3_line_height_phone=&#8221;1em&#8221; header_3_line_height_last_edited=&#8221;off|phone&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"text-align: center;\"><span style=\"color: #ff0000;\"><b>82.6%<\/b><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<div style=\"text-align: center;\">Of all phishing emails now contain AI-generated content (KnowBe4 Phishing Trends Report 2025)<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; header_2_line_height=&#8221;1em&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;60px&#8221; header_3_line_height=&#8221;1em&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;40px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_3_font_size_phone=&#8221;60px&#8221; header_3_font_size_last_edited=&#8221;off|phone&#8221; header_3_line_height_tablet=&#8221;1em&#8221; header_3_line_height_phone=&#8221;1em&#8221; header_3_line_height_last_edited=&#8221;off|phone&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"text-align: center;\"><span style=\"color: #ff0000;\"><b>1,265%<\/b><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<div style=\"text-align: center;\">Surge in AI-powered phishing attacks since the launch of generative AI tools (2025 data)<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;20px||20px||false|false&#8221; custom_padding=&#8221;20px||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; header_2_line_height=&#8221;1em&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;60px&#8221; header_3_line_height=&#8221;1em&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;40px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_3_font_size_phone=&#8221;60px&#8221; header_3_font_size_last_edited=&#8221;off|phone&#8221; header_3_line_height_tablet=&#8221;1em&#8221; header_3_line_height_phone=&#8221;1em&#8221; header_3_line_height_last_edited=&#8221;off|phone&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"text-align: center;\"><span style=\"color: #ff0000;\"><b>Most<\/b><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<div style=\"text-align: center;\">Of Malaysian organisations encountered AI-powered phishing threats in 2025, per Business Today Malaysia<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; header_2_line_height=&#8221;1em&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;60px&#8221; header_3_line_height=&#8221;1em&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;40px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_3_font_size_phone=&#8221;60px&#8221; header_3_font_size_last_edited=&#8221;off|phone&#8221; header_3_line_height_tablet=&#8221;1em&#8221; header_3_line_height_phone=&#8221;1em&#8221; header_3_line_height_last_edited=&#8221;off|phone&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"text-align: center;\"><span style=\"color: #ff0000;\"><b>3 seconds<\/b><\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<div style=\"text-align: center;\">AI voice cloning tools can create a convincing voice replica using this much source audio<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||40px||false|false&#8221; custom_padding_tablet=&#8221;||20px||false|false&#8221; custom_padding_phone=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<h2><b>\ud83e\udd16\u00a0 How AI Has Completely Changed Phishing<\/b><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|20px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p>For years, phishing emails were easy to spot. Bad grammar. Suspicious links. Generic greetings. Staff could be trained to catch them. That era is over.<\/p>\n<p>Today, attackers use large language models (LLMs), the same technology behind tools like ChatGPT, to generate phishing messages that are personalised, grammatically perfect, and contextually accurate. They reference real projects, use your company&#8217;s internal terminology, and match the tone of the person they are impersonating. Standard email filters, built to catch keyword patterns and formatting anomalies, cannot distinguish these messages from genuine communication.<\/p>\n<p>AI phishing in 2025 and 2026 operates across four distinct attack methods that every Malaysian business owner needs to understand:<\/p>[\/et_pb_text][dvmd_table_maker tbl_column_header_count=&#8221;0&#8243; tbl_row_header_count=&#8221;0&#8243; tbl_responsive_mode=&#8221;off&#8221; tbl_frame_type=&#8221;lines&#8221; tbl_frame_line_color=&#8221;#d6d6d6&#8243; tbl_frame_line_width=&#8221;2px&#8221; tbl_stripes_active=&#8221;on&#8221; tbl_hover_active=&#8221;horz&#8221; tbl_hover_tint=&#8221;-8&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; tbl_tcell_text_font=&#8221;||||||||&#8221; tbl_tcell_text_font_size=&#8221;17px&#8221; tbl_tcell_text_line_height=&#8221;1.6em&#8221; tbl_chead_text_font=&#8221;|700|||||||&#8221; tbl_rhead_text_font=&#8221;|700|||||||&#8221; custom_margin_tablet=&#8221;20px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][dvmd_table_maker_item col_label=&#8221;ATTACK TYPE&#8221; col_content=&#8221;ATTACK TYPE\nAI Spear Phishing\nAI Voice Cloning (Vishing)\nDeepfake Video Calls\nAI Business Email Compromise (BEC)&#8221; col_column_max_width=&#8221;0.3fr&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/dvmd_table_maker_item][dvmd_table_maker_item col_label=&#8221;HOW IT WORKS&#8221; col_content=&#8221;HOW IT WORKS\nLLMs generate personalised emails that reference real colleagues, projects, and company language. Reads exactly like a message from a trusted colleague or supplier.\nAttackers use 3 to 5 seconds of audio from a LinkedIn video, webinar, or podcast to clone an executive&#8217;s voice. They call staff and issue verbal instructions.\nAI generates real-time video of executives during video calls. Colleagues, clients, and partners are convincingly impersonated in live meetings.\nAI researches your organisation, identifies key people, understands relationships and financial workflows, then crafts a targeted fraud campaign at scale.&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/dvmd_table_maker_item][dvmd_table_maker_item col_label=&#8221;THE BUSINESS RISK&#8221; col_content=&#8221;THE BUSINESS RISK\nFinance teams tricked into wire transfers. Employees surrender login credentials. Supply chain partners are impersonated.\nAn employee receives a call that sounds exactly like the CFO authorising an urgent payment. 77% of voice clone victims lose money.\nThe entire board appears on a Teams call. Every person is a deepfake. Employees authorise sensitive actions believing leadership approved them.\nAttackers impersonate suppliers changing bank account details, solicitors requesting urgent transfers, or government agencies demanding payments.&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/dvmd_table_maker_item][\/dvmd_table_maker][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||40px||false|false&#8221; custom_padding_tablet=&#8221;||20px||false|false&#8221; custom_padding_phone=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<h2>\ud83c\udf10 <b>What the World&#8217;s Experts Are Saying<\/b><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; global_colors_info=&#8221;{}&#8221;]<p style=\"font-weight: 400;\"><strong>KnowBe4: Phishing Trends Threat Report 2025<\/strong><\/p>\n<p style=\"font-weight: 400;\">KnowBe4, the world&#8217;s largest security awareness training platform, confirmed that 82.6% of phishing emails detected between September 2024 and February 2025 contained AI-generated content, a 53.5% year-on-year increase. This represents a fundamental shift: AI phishing is no longer an emerging trend. It is the dominant method.<\/p>\n<p style=\"font-weight: 400;\">KnowBe4 also found that organisations implementing regular security awareness training reduced successful phishing click rates by more than 40% within 90 days, and by up to 86% within a year. The human element remains both the greatest vulnerability and the most effective defence.<\/p>\n<p style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Source: <\/span><a href=\"https:\/\/www.knowbe4.com\/free-cybersecurity-tools\/phishing-security-test\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">KnowBe4 Phishing Trends Threat Report 2025<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; global_colors_info=&#8221;{}&#8221;]<p style=\"font-weight: 400;\"><strong>Business Today Malaysia: Closing the Phishing Gap in the Age of AI (2025)<\/strong><\/p>\n<p style=\"font-weight: 400;\">A major study on Malaysian organisations published in Business Today Malaysia in September 2025 revealed the scale of the local AI phishing crisis:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>The majority of Malaysian organisations reported encountering AI-powered phishing threats in the past year<\/li>\n<li>Of those affected, more than half reported the volume of attacks had doubled, while nearly a quarter said it had tripled<\/li>\n<li>Only 19% of Malaysian organisations expressed strong confidence in their ability to defend against AI-powered phishing<\/li>\n<li>More than one in four admitted their detection capabilities are lagging behind attacker sophistication<\/li>\n<li>One in five confessed to having no ability to monitor AI-based attacks at all<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">The report concluded: <em>&#8220;The gap between attacker innovation and defender preparedness is widening.&#8221;<\/em><\/p>\n<p style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Source: <\/span><a href=\"https:\/\/www.businesstoday.com.my\/2025\/09\/29\/closing-the-phishing-gap-in-the-age-of-ai\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Business Today Malaysia: Closing the Phishing Gap in the Age of AI<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; global_colors_info=&#8221;{}&#8221;]<p style=\"font-weight: 400;\"><strong>Hoxhunt Phishing Trends Report 2026: The 14x Holiday Surge<\/strong><\/p>\n<p style=\"font-weight: 400;\">Hoxhunt, which analyses phishing threats across more than 4 million users monthly, documented a landmark event in December 2025: a 14-fold surge in AI-generated phishing attacks, ending the year with AI phishing making up 56% of all threats detected in that month, up from just 4% in November.<\/p>\n<p style=\"font-weight: 400;\">Hoxhunt&#8217;s Co-Founder and CTO Pyry Avist stated: &#8220;AI is fuelling a new era of social engineering tactics. This report illustrates how AI-driven insights and automation can directly correlate higher employee engagement to reduced phishing risk.&#8221; The finding that carries into 2026: AI phishing is no longer a niche capability. It is now the standard attack method.<\/p>\n<p style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Source: <\/span><a href=\"https:\/\/hoxhunt.com\/guide\/phishing-trends-report\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Hoxhunt Phishing Trends Report 2026<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; global_colors_info=&#8221;{}&#8221;]<p style=\"font-weight: 400;\"><strong>Brightside AI and World Economic Forum: Deepfake CEO Fraud Data 2025<\/strong><\/p>\n<p style=\"font-weight: 400;\">Deepfake-related fraud losses exceeded USD$200 million in the first quarter of 2025 alone, according to World Economic Forum data. For full-year 2025, deepfake fraud losses in the United States alone reached USD$1.1 billion, tripling from USD$360 million in 2024.<\/p>\n<p style=\"font-weight: 400;\">The scale of the threat:<\/p>\n<ul>\n<li>Voice cloning fraud rose 680% in the past year<\/li>\n<li>The average loss per deepfake fraud incident now exceeds USD$500,000<\/li>\n<li>CEO fraud using deepfakes now targets at least 400 companies per day globally<\/li>\n<li>AI can clone a person&#8217;s voice with 85% accuracy using just 3 to 5 seconds of audio from any public source<\/li>\n<li>80% of companies have no established protocols or response plans for a deepfake-based attack<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Sources: <\/span><a href=\"https:\/\/www.brside.com\/blog\/deepfake-ceo-fraud-50m-voice-cloning-threat-cfos\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Brightside AI: Deepfake CEO Fraud Report 2025<\/span><\/a><span style=\"font-weight: 400;\"><span>\u00a0 <\/span>|<span>\u00a0 <\/span><\/span><a href=\"https:\/\/www.weforum.org\/publications\/global-cybersecurity-outlook-2025\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">WEF Global Cybersecurity Outlook 2025<\/span><\/a><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; global_colors_info=&#8221;{}&#8221;]<p style=\"font-weight: 400;\"><strong>CyberSecurity Malaysia Cyber999: Phishing Remains Top Threat in Malaysia (2025)<\/strong><\/p>\n<p style=\"font-weight: 400;\">CyberSecurity Malaysia&#8217;s Cyber999 Incident Response Centre confirmed that phishing represented 73% of all fraud incidents reported in Malaysia in the most recent reporting quarter, making it by far the leading cyber threat category. Key phishing patterns identified in Malaysia in 2025:<\/p>\n<ul>\n<li>Government aid scams: AI-generated emails and SMS impersonating bantuan kerajaan programmes to steal personal data and banking credentials<\/li>\n<li>Brand impersonation: Shopee, Lazada, Maybank, and CIMB are among the most frequently spoofed brands in AI-generated phishing campaigns<\/li>\n<li>Traffic summons and LHDN scams: Messages claiming unpaid police fines or tax notices directing victims to fake payment portals<\/li>\n<li>WhatsApp CEO fraud: AI-generated messages impersonating business owners to instruct staff to make urgent transfers<\/li>\n<li>Vishing (voice phishing): Callers impersonating PDRM, LHDN, and even CyberSecurity Malaysia staff to extract sensitive information<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Source: <\/span><a href=\"https:\/\/www.cybersecurity.my\/portal-main\/advisories-details\/e14a3424-f7d4-11ef-9a4c-005056812d51\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">CyberSecurity Malaysia Cyber999 Q4 2024 Incident Report<\/span><\/a><\/p>\n<p style=\"font-weight: 400;\">[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<h2>\ud83c\uddf2\ud83c\uddfe <b>How AI Phishing Is Targeting Malaysian Businesses Right Now<\/b><span style=\"font-size: 16px;\">\u00a0<\/span><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<div><span>These are not theoretical scenarios. They represent the actual attack patterns documented in Malaysia in 2025 and 2026:<\/span><\/div>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; global_colors_info=&#8221;{}&#8221;]<p style=\"font-weight: 400;\"><strong>\ud83d\udd34<span>\u00a0 <\/span><span style=\"color: #ff0000;\">The RM800,000 WhatsApp CEO Fraud<\/span><br \/><\/strong>A Kuala Lumpur finance firm received a WhatsApp message impersonating the CEO, requesting an urgent wire transfer of RM800,000 to a new vendor account. The message was AI-generated, trained on the CEO&#8217;s writing style from months of captured communications. The transfer was made before the fraud was detected. (Source: SimplyData Malaysia Cybersecurity Landscape 2026)<\/p>\n<p style=\"font-weight: 400;\"><strong>\ud83d\udd34<span>\u00a0 <\/span><span style=\"color: #ff0000;\">The Selangor Manufacturer Supply Chain Attack<\/span><br \/><\/strong>A Selangor-based manufacturer received a convincing email appearing to come from an established customer, requesting urgent supplies with updated bank account details. The email referenced real past orders and used the customer&#8217;s actual company letterhead design, cloned by AI. Fraudulent payment was processed before verification could be completed.<\/p>\n<p style=\"font-weight: 400;\"><strong>\ud83d\udd34<span>\u00a0 <\/span><span style=\"color: #ff0000;\">Shopee and Lazada Brand Impersonation<\/span><br \/><\/strong>Throughout 2025, Malaysian consumers and business procurement staff received AI-generated promotional emails from convincingly spoofed Shopee and Lazada accounts offering exclusive bulk purchase discounts. Clicking the embedded links led to near-identical cloned websites that captured login and payment credentials.<\/p>\n<p style=\"font-weight: 400;\"><strong>\ud83d\udd34<span>\u00a0 <\/span><span style=\"color: #ff0000;\">LHDN and PDRM Vishing Campaigns<\/span><br \/><\/strong><span style=\"font-weight: 400;\">Scam callers using AI voice cloning impersonated LHDN (Inland Revenue Board) and PDRM officers, threatening recipients with arrest for unpaid taxes or traffic summons. The calls used realistic hold music, department transfer audio, and convincing official-sounding scripts generated by AI. Many victims paid fraudulent settlements under duress.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<h2>\ud83d\udcb8 <b>The Real Business Cost of AI Phishing<\/b><span style=\"font-size: 16px;\">\u00a0<\/span><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<div><span>Phishing is the entry point for the majority of cyber incidents. Understanding its true financial impact helps business leaders put the right investment case forward for prevention.<\/span><\/div>\n<div><\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; global_colors_info=&#8221;{}&#8221;]<p style=\"font-weight: 400;\"><strong>What AI Phishing Really Costs a Malaysian Business<\/strong><\/p>\n<p style=\"font-weight: 400;\"><strong>\ud83d\udce7<span>\u00a0 <\/span>Phishing-Originated Breach Cost<br \/><\/strong>According to IBM&#8217;s 2025 Cost of a Data Breach Report, the average cost of a breach that originated from phishing is USD$4.88 million (approximately RM22 million). Phishing is the most expensive breach category, exceeding even ransomware in total downstream costs.<\/p>\n<p style=\"font-weight: 400;\"><strong>\ud83d\udcb0<span>\u00a0 <\/span>Business Email Compromise (BEC) Losses<br \/><\/strong>BEC caused USD$2.77 billion in reported losses globally in 2024, according to the FBI&#8217;s Internet Crime Complaint Center. BEC is the costliest cybercrime category per incident, because it targets high-value financial transactions directly. A single spoofed supplier payment request can redirect hundreds of thousands of ringgit.<\/p>\n<p style=\"font-weight: 400;\"><strong>\ud83c\udf99<span>\u00a0 <\/span>Deepfake Voice Fraud<br \/><\/strong>The average financial loss per deepfake voice fraud incident globally now exceeds USD$500,000. In Malaysia, a single successful AI CEO fraud attack, such as the documented RM800,000 case, can wipe out months of business profit in one transaction.<\/p>\n<p style=\"font-weight: 400;\"><strong>\u23f1<span>\u00a0 <\/span>Detection Delay Multiplies Cost<br \/><\/strong>According to SimplyData&#8217;s 2025 Malaysia Threat Report, the average time to detect a breach in Malaysia is 187 days. AI-generated phishing attacks are designed to avoid triggering automated alerts, meaning they can operate inside an organisation for months before detection. Every additional day of undetected compromise adds to the total cost.<\/p>\n<p style=\"font-weight: 400;\"><strong>\ud83d\udcc9<span>\u00a0 <\/span>Reputation and Customer Trust<br \/><\/strong>Research shows that 60% of breaches involve a human action as a contributing factor (Verizon DBIR 2025). When phishing succeeds, customer data is often exposed. Under Malaysia&#8217;s PDPA 2024, the business is responsible for that exposure, regardless of whether it was an employee error.<\/p>\n<p style=\"font-weight: 400;\">\n<p style=\"font-weight: 400; text-align: center;\"><strong><em>Phishing does not just start with an email. It ends with a balance sheet.<\/em><\/strong><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<h2>\ud83d\udc41 <b>Why Even Your Most Careful Staff Are Being Fooled<\/b><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|20px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<div><span>For years, the advice was simple: look for spelling mistakes, check the sender&#8217;s email address, hover over links. These rules no longer work reliably against AI-generated phishing. Here is why:<\/span><\/div>\n<\/div>[\/et_pb_text][dvmd_table_maker tbl_column_header_count=&#8221;0&#8243; tbl_row_header_count=&#8221;0&#8243; tbl_responsive_mode=&#8221;off&#8221; tbl_frame_type=&#8221;lines&#8221; tbl_frame_line_color=&#8221;#d1d1d1&#8243; tbl_frame_line_width=&#8221;3px&#8221; tbl_stripes_active=&#8221;vert&#8221; tbl_stripes_order=&#8221;odd&#8221; tbl_hover_active=&#8221;horz&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; tbl_tcell_text_font_size=&#8221;16px&#8221; tbl_tcell_text_line_height=&#8221;1.6em&#8221; custom_margin=&#8221;10px||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][dvmd_table_maker_item col_label=&#8221;WHY TRADITIONAL TRAINING IS NO LONGER ENOUGH&#8221; col_content=&#8221;WHY TRADITIONAL TRAINING IS NO LONGER ENOUGH\nPerfect Language and Tone\nPersonalisation at Scale\nVoice and Video You Cannot Question\nAdversary-in-the-Middle (AiTM) Attacks\nSpeed and Overwhelm&#8221; col_column_max_width=&#8221;0.6fr&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/dvmd_table_maker_item][dvmd_table_maker_item col_label=&#8221;WHAT IS ACTUALLY HAPPENING&#8221; col_content=&#8221;WHAT IS ACTUALLY HAPPENING\nLLMs generate grammatically flawless messages that match the writing style of the person being impersonated. There are no typos, no awkward phrasing, no generic greetings.\nAI researches its target before attacking. It knows who your CEO is, who handles payments, what projects are running, and which suppliers you work with. The email references information that only an insider would know.\nA voice call from what sounds exactly like your CFO bypasses every email-based security training. Our brains are wired to trust familiar voices. Deepfake video calls add another layer: seeing and hearing your colleagues overrides rational scepticism.\nAttackers now intercept authentication sessions in real time, stealing session cookies and bypassing Multi-Factor Authentication (MFA). AiTM attacks surged 146% in 2024, meaning even businesses with MFA in place cannot assume they are fully protected.\nAI allows attackers to launch thousands of personalised phishing campaigns simultaneously. The volume of AI-generated phishing has surged 1,265% since the arrival of generative AI tools. Staff reviewing hundreds of emails daily simply cannot maintain the vigilance required to catch every one.&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/dvmd_table_maker_item][\/dvmd_table_maker][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<h2><b>\ud83d\udee1\ufe0f What Effective AI Phishing Protection Looks Like<\/b><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<div><span>Defending against AI phishing requires a layered approach that combines technology, processes, and people. No single measure is sufficient on its own. Here is what to expect from a qualified cybersecurity provider, and what to ask your current IT team:<\/span><\/div>[\/et_pb_text][dvmd_table_maker tbl_column_header_count=&#8221;0&#8243; tbl_row_header_count=&#8221;0&#8243; tbl_responsive_mode=&#8221;off&#8221; tbl_frame_type=&#8221;lines&#8221; tbl_frame_line_color=&#8221;#d1d1d1&#8243; tbl_frame_line_width=&#8221;3px&#8221; tbl_stripes_active=&#8221;vert&#8221; tbl_stripes_order=&#8221;odd&#8221; tbl_hover_active=&#8221;horz&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; tbl_tcell_text_font_size=&#8221;16px&#8221; tbl_tcell_text_line_height=&#8221;1.6em&#8221; custom_margin=&#8221;10px||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][dvmd_table_maker_item col_label=&#8221;PROTECTION LAYER&#8221; col_content=&#8221;PROTECTION LAYER\nAI-Powered Email Security\nRegular Phishing Simulation Training\nVerification Protocols for Financial Transactions\nVoice and Video Verification Procedures\nMulti-Layer Authentication Beyond Basic MFA&#8221; col_column_max_width=&#8221;0.6fr&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/dvmd_table_maker_item][dvmd_table_maker_item col_label=&#8221;WHAT TO EXPECT FROM YOUR IT PROVIDER&#8221; col_content=&#8221;WHAT TO EXPECT FROM YOUR IT PROVIDER\nStandard spam filters cannot detect AI-generated phishing. A qualified provider should deploy advanced email security that uses behavioural analysis and machine learning to detect threats based on intent and context, not just keywords and formatting.\nSending staff controlled phishing simulations is the most effective way to build awareness. Organisations that run regular simulations reduce successful click rates by over 40% within 90 days and up to 86% within one year (KnowBe4 2025).\nAny financial transfer or sensitive request received via email, WhatsApp, or phone call should require verification through a completely separate channel before action is taken. This single procedural rule stops the majority of BEC and CEO fraud attacks.\nStaff handling financial approvals should be trained to request a pre-agreed code phrase or question when receiving unexpected calls from executives. A call that cannot provide the code phrase must be escalated and verified before any action.\nGiven the rise of AiTM attacks that bypass standard MFA, your provider should be evaluating phishing-resistant authentication options such as hardware security keys and FIDO2-based passkeys for high-risk access points.&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/dvmd_table_maker_item][\/dvmd_table_maker][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<h2><b>5 AI Phishing Readiness Questions to Ask Your IT Provider<\/b><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"font-weight: 400;\">Bring these to your next IT security review. The answers will quickly reveal whether your current defences are keeping pace with the AI phishing threat:<\/p>\n<ul>\n<li><em>Does our email security system use AI and behavioural analysis to detect phishing, or does it rely on keyword filters and known malicious domain lists?<\/em><\/li>\n<li><em>When did our staff last receive phishing simulation training, and what was our click rate on the simulated attacks?<\/em><\/li>\n<li><em>Do we have a written policy requiring staff to verify any financial transaction or sensitive request received by phone or messaging app through a separate channel before acting?<\/em><\/li>\n<li><em>Are our high-risk staff, particularly finance team members, trained on AI voice cloning and deepfake video call fraud?<\/em><\/li>\n<li><em>Does our current MFA solution protect against session cookie theft and adversary-in-the-middle attacks, or is it standard SMS or app-based authentication?<\/em><\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><strong><em>Any gap identified from these questions is a gap that attackers are already aware of and actively exploiting. The good news is that most can be addressed quickly with the right guidance.<\/em><\/strong><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f6921e&#8221; custom_margin=&#8221;30px||30px||false|false&#8221; custom_padding=&#8221;60px|40px|60px|40px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<h2 style=\"text-align: center;\"><span style=\"color: #123884;\"><b>One Action You Can Take Right Now<\/b><\/span><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<span style=\"color: #123884;\">Implement a verbal verification rule for all financial transactions today: any payment request received by email, WhatsApp, or phone call must be confirmed by calling the requester back on their known, saved number before any funds are moved.<\/span>\n\n<span style=\"color: #123884;\"><b>This costs nothing to implement, requires no IT budget, and stops the majority of CEO fraud and BEC attacks. Brief your accounts and finance team on this rule this week.<\/b><\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<h2><b>AI Phishing Is Evolving Daily. Your Defences Should Too.<\/b><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p><span style=\"color: #ff9900;\"><strong><em>The best phishing defence is one your staff have actually practised.<\/em><\/strong><\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|10px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p>We encourage every Malaysian business owner to have an honest conversation with their current IT adviser or cybersecurity provider about AI phishing readiness. Ask whether your email security uses AI-based detection. Ask when staff last completed phishing simulation training. Ask whether your finance team has a verified call-back protocol in place. These are straightforward, practical questions that any good IT partner should be ready to answer.<\/p>\n<p>If you would like a second perspective on your current phishing defences, or would like to understand what AI-era email security looks like in practice, BigBand is available for a no-obligation advisory conversation. We work alongside your existing team, not in replacement of it.<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;20px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<span style=\"color: #ff9900;\"><strong><em>The decision is always yours. We are simply here when you are ready to have the conversation.<\/em><\/strong><\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#0060ae&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;60px||60px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<p><span style=\"color: #ffffff;\"><strong>FREE BUSINESS TOOL<\/strong><\/span><\/p>[\/et_pb_text][et_pb_text content_tablet=&#8221;<h2>The Reality of Cyber Risk<br \/>in Malaysia Today<\/h2>&#8221; content_phone=&#8221;<h2>The Reality of Cyber Risk in Malaysia Today<\/h2>&#8221; content_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; header_2_font_size=&#8221;44px&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; header_2_font_size_tablet=&#8221;42px&#8221; header_2_font_size_phone=&#8221;34px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2><span style=\"color: #ffffff;\">Cyber Security<br \/>Risk Review Checklist<\/span><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;20px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p><span style=\"color: #ffffff;\">Most organisations are unsure of their actual cyber risk exposure. BigBand&#8217;s self-assessment tool evaluates your protection across 7 critical areas and places your organisation into one of four risk levels.<\/span><\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #11aa5d;\">\u2713 Low Exposure<\/span><\/h3>\n<h3 style=\"text-align: center;\"><span style=\"color: #f7c318;\">\u26a0 Moderate Risk<\/span><\/h3>\n<h3 style=\"text-align: center;\"><span style=\"color: #ef8017;\">\u26a0 High Risk<\/span><\/h3>\n<h3 style=\"text-align: center;\"><span style=\"color: #e02b20;\">\u2715 Critical Exposure<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;14px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px||0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;||||false|false&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;24px&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_phone=&#8221;1.3em&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; border_color_all=&#8221;RGBA(255,255,255,0)&#8221; border_color_top=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"source-note\"><span style=\"color: #ffffff;\"><em><strong>Reviews:<\/strong> Firewall &amp; network \u00b7 Endpoint coverage \u00b7 Remote access \u00b7 Backup readiness \u00b7 Email &amp; phishing \u00b7 Monitoring capability \u00b7 Incident response<\/em><\/span><\/div>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_form use_spam_service=&#8221;on&#8221; recaptcha_list=&#8221;BigBand Website|BigBand Website-0&#8243; email=&#8221;edward@bigband.net.my&#8221; title=&#8221;Download Your Free Checklist&#8221; custom_message=&#8221;Big Band Blog||et_pb_line_break_holder||AI Phishing: Why Your Staff Cannot Tell Fake from Real Anymore.||et_pb_line_break_holder||||et_pb_line_break_holder||||et_pb_line_break_holder||Name:||et_pb_line_break_holder||%%Name%%||et_pb_line_break_holder||||et_pb_line_break_holder||Company Name:||et_pb_line_break_holder||%%Company%%||et_pb_line_break_holder||||et_pb_line_break_holder||Business Email Address:||et_pb_line_break_holder||%%Email%%||et_pb_line_break_holder||||et_pb_line_break_holder||Contact Number:||et_pb_line_break_holder||%%Contact%%||et_pb_line_break_holder||||et_pb_line_break_holder||||et_pb_line_break_holder||This email was sent from a contact form on https:\/\/bigband.net.my\/index.php\/2026\/03\/24\/ai-phishing-why-your-staff-cannot-tell-fake-from-real-anymore\/ ||et_pb_line_break_holder||&#8221; use_redirect=&#8221;on&#8221; redirect_url=&#8221;\/index.php\/cyber-security-services-risk-review-checklist-thank-you\/&#8221; submit_button_text=&#8221;Download Cyber Security Risk Review&#8221; module_id=&#8221;et_pb_contact_form_0&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;57644e57-22ad-4d0c-be78-8720b39a3eb5&#8243; form_field_background_color=&#8221;#FFFFFF&#8221; form_field_text_color=&#8221;#58595b&#8221; form_field_focus_background_color=&#8221;#FFFFFF&#8221; form_field_focus_text_color=&#8221;#58595b&#8221; title_font=&#8221;|600|||||||&#8221; title_text_color=&#8221;#FFFFFF&#8221; title_font_size=&#8221;26px&#8221; captcha_text_color=&#8221;RGBA(255,255,255,0)&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#123884&#8243; button_bg_color=&#8221;#f6921e&#8221; button_border_width=&#8221;0px&#8221; button_border_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_radius=&#8221;7px&#8221; button_font=&#8221;|600|||||||&#8221; custom_margin=&#8221;45px||||false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;Your Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Company&#8221; field_title=&#8221;Company Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;Business Email Address&#8221; field_type=&#8221;email&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Contact&#8221; field_title=&#8221;Contact Number&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;14px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px||0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;||||false|false&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;24px&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_phone=&#8221;1.3em&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; border_color_all=&#8221;RGBA(255,255,255,0)&#8221; border_color_top=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"source-note\"><span style=\"color: #ffffff;\"><em>** Your details are kept strictly confidential. No spam, ever. **<\/em><\/span><\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>AI Phishing:Why Your Staff Cannot Tell Fake from Real Anymore.The email looks real. The voice sounds familiar. The video call seems genuine. In 2025 and 2026, none of these are guarantees.\ud83d\udea8 A Wire Transfer Your CFO Never ApprovedIt is a regular Tuesday afternoon. Your accounts executive receives a WhatsApp message from what appears to be [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28089,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","footnotes":""},"categories":[38],"tags":[57,77,41,75,76,56,78],"class_list":["post-28075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-bigband","tag-businessprotection","tag-cybersecurity","tag-deepfake","tag-malaysiasme","tag-pdpa","tag-phishing"],"_links":{"self":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts\/28075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/comments?post=28075"}],"version-history":[{"count":10,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts\/28075\/revisions"}],"predecessor-version":[{"id":28096,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts\/28075\/revisions\/28096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/media\/28089"}],"wp:attachment":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/media?parent=28075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/categories?post=28075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/tags?post=28075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}