Phishing Help
Cyberline By Periculo
Follow the below guidance to understand if your dealing with a threat. If you would like to talk to an advisor use the live chat functionality.

Threat Flow
If you are uncertain or suspect a phishing threat, please follow this guidance.
Check the Sender's Email Address
Phishing emails often come from an email address that looks legitimate but has minor alterations. For example, an email from "support@amazone.com" instead of "support@amazon.com". So, always double-check the email address.
Inspect the greeting, is it generic
Many phishing emails start with a generic greeting, like "Dear Customer," instead of your actual name.
Review the email content
Phishing emails often have poor grammar and spelling errors. They might also use a tone that creates a sense of urgency, such as threatening to close your account if you don't act immediately.
Is the request unusual or urgent
Be wary of emails requesting personal information, account details, or money. Attackers often use a sense of urgency to make you act
Check for suspicious links
Hover over any links in the email (without clicking them) to see where they lead. Be cautious if the link address doesn't match the company's official website or if it's a shortened URL.
Contact the company directly
If you're still unsure, contact the company directly using the contact information provided on their official website. Do not use any contact information provided in the suspicious email.
Protect Yourself from Phishing Attacks
Phishing is one of the most common cyber threats, tricking individuals into revealing sensitive information. Attackers impersonate trusted sources—like your bank, IT department, or even your boss—to steal login credentials, and financial details, or deploy malware.
🔍 Common Phishing Techniques
Email Phishing
Fake emails that appear to be from trusted sources.
Spear Phishing
Targeted attacks on specific individuals or companies.
Smishing (SMS Phishing)
Text messages with fraudulent links.
Vishing (Voice Phishing)
Scammers impersonating IT support or government officials over the phone.
CEO Fraud
Attackers impersonate executives to request urgent transfers or sensitive information.