Voice phishing is second most common initial access method across all IR probes, and top in cloud break-ins Voice phishing surged last year to become the second most common method used by cybercriminals to gain initial access to their victims' IT estate and the No. 1 tactic used when breaking into cloud environments.
Published: 2026-03-23T15:00:10