Dial M for Malware: How Phone Scams Are Ringing in Cybersecurity Headaches
Phone calls have joined emails as a weapon of choice for attackers, using deepfake technology to impersonate IT departments and trick employees into resetting passwords. As scammers up their game, organizations must boost defenses beyond email filters. Remember, if a call sounds fishy, hang up before you become the catch of the day!

Hot Take:
Who knew the old-fashioned phone call would become the latest weapon of choice for cybercriminals? It seems like our digital adversaries are taking a page out of grandma’s playbook, but instead of calling to ask about weekend plans, they’re phishing for passwords with the finesse of a telemarketer selling extended car warranties. And just when you thought it was safe to pick up the phone, technology has made it possible for these scammers to sound like your trusted IT guy, Frank, who you last saw at the office holiday party. So, the next time you get a call asking you to reset your password, make sure it’s not the cyber equivalent of a butt dial.
Key Points:
- Cybercriminals are now using phone calls to launch social engineering attacks, often impersonating IT departments.
- Deepfake technology exacerbates phone-based scams, making fraudsters sound like familiar team members.
- Credential compromise remains a key method for attackers to infiltrate organizations.
- Multi-factor authentication (MFA) is essential, but SMS-based 2FA is vulnerable to SIM-swapping attacks.
- AI security risks are growing, requiring organizations to adopt AI security tools.