Skip to content

Phishing Help

Cyberline By Periculo

Follow the below guidance to understand if your dealing with a threat. If you would like to talk to an advisor use the live chat functionality.

A realistic digital illustration of a phishing cyber attack
Periculo

Threat Flow

If you are uncertain or suspect a phishing threat, please follow this guidance.

Check the Sender's Email Address

Phishing emails often come from an email address that looks legitimate but has minor alterations. For example, an email from "support@amazone.com" instead of "support@amazon.com". So, always double-check the email address.

Inspect the greeting, is it generic

Many phishing emails start with a generic greeting, like "Dear Customer," instead of your actual name.

Review the email content

Phishing emails often have poor grammar and spelling errors. They might also use a tone that creates a sense of urgency, such as threatening to close your account if you don't act immediately.

Is the request unusual or urgent

Be wary of emails requesting personal information, account details, or money. Attackers often use a sense of urgency to make you act

Check for suspicious links

Hover over any links in the email (without clicking them) to see where they lead. Be cautious if the link address doesn't match the company's official website or if it's a shortened URL.

Contact the company directly

If you're still unsure, contact the company directly using the contact information provided on their official website. Do not use any contact information provided in the suspicious email.

Protect Yourself from Phishing Attacks

Phishing is one of the most common cyber threats, tricking individuals into revealing sensitive information. Attackers impersonate trusted sources—like your bank, IT department, or even your boss—to steal login credentials, and financial details, or deploy malware.

🔍 Common Phishing Techniques

Email Phishing

Fake emails that appear to be from trusted sources.

Spear Phishing

Targeted attacks on specific individuals or companies.

Smishing (SMS Phishing)

Text messages with fraudulent links.

Vishing (Voice Phishing)

Scammers impersonating IT support or government officials over the phone.

CEO Fraud 

Attackers impersonate executives to request urgent transfers or sensitive information.

Subscribe to Periculo Threat Feed

Get the latest threats, vulnerabilities, cyber-attacks and patching updates straight into your inbox.