Voice Phishing Surges to #2 Initial Access Method, #1 for Cloud Breaches — Google's Mandiant Report

Available in: 中文
2026-03-29T20:26:36.737Z·1 min read
Google's Mandiant M-Trends 2026 report reveals that voice phishing has surged to become the second most common initial access method (11% of attacks) and the number one tactic for breaching cloud e...

Google's Mandiant M-Trends 2026 report reveals that voice phishing has surged to become the second most common initial access method (11% of attacks) and the number one tactic for breaching cloud environments.

Key Findings

MethodShare of Attacks
Vulnerability exploitation32% (#1, 6th year running)
Voice phishing11% (#2, surging)
Email phishing (non-interactive)6% (declining)

Why Voice Phishing Works

ClickFix Attacks

Attackers trick users into running malicious commands by:

Extreme Timelines

Fast Hand-offs

Long-Term Stealth

Data Source

Based on 500,000+ hours of incident response engagements worldwide.

Source: The Register, Google Mandiant M-Trends 2026

↗ Original source · 2026-03-29T00:00:00.000Z
← Previous: Microsoft Admits Windows 11 Quality Problems: Removing Copilots, Improving Performance, Lowering RAM UsageNext: Meta's AI Content Moderation Shows Modest Improvements as Company Shuts Down Metaverse Platform Horizon Worlds →
Comments0