{"id":19664,"date":"2025-06-26T09:11:02","date_gmt":"2025-06-26T09:11:02","guid":{"rendered":"https:\/\/saga.rs\/cyber-security\/phishing-campaigns\/"},"modified":"2025-10-02T10:48:12","modified_gmt":"2025-10-02T10:48:12","slug":"phishing-campaigns","status":"publish","type":"page","link":"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/","title":{"rendered":"Phishing Campaigns"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row custom_css_code=&#8221;JTJGJTJBJTIwTGlzdCUyMEl0ZW0lMjAlMkElMkYlMEEucG9zdC1icmVhZGNydW1icyUyMHVsJTIwbGklM0FudGgtY2hpbGQlMjgxJTI5JTdCJTBBJTA5cGFkZGluZy1sZWZ0JTNBMHB4JTNCJTBBJTA5JTBBJTdEJTBBJTBB&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341eb5e9 {margin-top: 100px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d0e341eb5e9 {display: none;}}<\/style><div id=\"thegem-divider-69d0e341eb5e9\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d0e341eb7ba1575\" ><h1 id=\"thegem-heading-69d0e341eb765\" class=\"thegem-heading title-h2\" style=\"text-align: left;\" ><span>Phishing Campaigns<\/span><\/h1><style type=\"text\/css\">#thegem-heading-69d0e341eb765 {margin: 0;}#thegem-heading-69d0e341eb765 a:hover, #thegem-heading-69d0e341eb765 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341eb7ba1575{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341eb7ba1575{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341eb7ba1575{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341eb7ba1575{position: relative !important;}}<\/style><div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341eb848 {margin-bottom: 40px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d0e341eb848 {margin-bottom: 20px !important;}}<\/style><div id=\"thegem-divider-69d0e341eb848\" class=\"gem-divider  \" style=\"\" ><\/div><style>.thegem-te-post-breadcrumbs.thegem-custom-69d0e341eb8944245 .post-breadcrumbs {justify-content: left; text-align: left;}.thegem-te-post-breadcrumbs.thegem-custom-69d0e341eb8944245 .post-breadcrumbs ul {justify-content: left; text-align: left;}.thegem-te-post-breadcrumbs.thegem-custom-69d0e341eb8944245 .post-breadcrumbs ul li {color: #2A55A2;}.thegem-te-post-breadcrumbs.thegem-custom-69d0e341eb8944245 .post-breadcrumbs ul li a {color: #2A55A2;}.thegem-te-post-breadcrumbs.thegem-custom-69d0e341eb8944245 .post-breadcrumbs ul li a:hover {color: #56ADE4;}.thegem-te-post-breadcrumbs.thegem-custom-69d0e341eb8944245 .post-breadcrumbs ul li:last-child {color: #2A55A2;}<\/style><div class=\"thegem-te-post-breadcrumbs custom-breadcrumb thegem-custom-69d0e341eb8944245\"> <div class=\"post-breadcrumbs\"><ul><li><a href=\"https:\/\/saga.rs\/en\/\">Home<\/a><\/li><\/ul><!-- .breadcrumbs --><\/div> <\/div><div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341ec225 {margin-bottom: 20px !important;}<\/style><div id=\"thegem-divider-69d0e341ec225\" class=\"gem-divider  \" style=\"\" ><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; el_sticky=&#8221;1&#8243; el_sticky_offset=&#8221;130px&#8221;]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341ec297 {margin-bottom: 20px !important;}<\/style><div id=\"thegem-divider-69d0e341ec297\" class=\"gem-divider  \" style=\"border-width: 1px;width: 50px;border-color: #2A55A2;\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d0e341ec4201170\" ><h1 id=\"thegem-heading-69d0e341ec3ae\" class=\"thegem-heading title-h6 vc_custom_1757661534175\" style=\"text-align: left;\" ><span>Phishing Campaigns<\/span><\/h1><style type=\"text\/css\">#thegem-heading-69d0e341ec3ae {margin: 0;}#thegem-heading-69d0e341ec3ae a:hover, #thegem-heading-69d0e341ec3ae a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ec4201170{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ec4201170{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ec4201170{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ec4201170{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]<strong>Anticipate vulnerabilities before they become a serious threat.<\/strong>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_single_image image=&#8221;5340&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1750929337917{padding-bottom: 10px !important;}&#8221;]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341ec486 {margin-bottom: 20px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d0e341ec486 {display: none;}}<\/style><div id=\"thegem-divider-69d0e341ec486\" class=\"gem-divider  \" style=\"\" ><\/div>[vc_column_text css=&#8221;&#8221;]Phishing attacks are one of the biggest challenges in today\u2019s digital environment. They are often the first step in sophisticated cyberattacks that can compromise your company\u2019s data, assets, and reputation. Our simulated phishing campaigns help you identify security weaknesses before attackers exploit them.[\/vc_column_text]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341ec4bf {margin-bottom: 20px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d0e341ec4bf {display: none;}}<\/style><div id=\"thegem-divider-69d0e341ec4bf\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d0e341ec5b97535\" ><h3 id=\"thegem-heading-69d0e341ec58e\" class=\"thegem-heading title-h5 vc_custom_1757661612077\" style=\"text-align: left;\" ><span class=\"colored\" style=\"color: #2A55A2;\">Reduce Vulnerability \u2013 Increase Resilience!<\/span><\/h3><style type=\"text\/css\">#thegem-heading-69d0e341ec58e {margin: 0;}#thegem-heading-69d0e341ec58e a:hover, #thegem-heading-69d0e341ec58e a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ec5b97535{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ec5b97535{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ec5b97535{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ec5b97535{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]We offer two phishing campaign options, allowing you to choose the solution best suited to your business needs.[\/vc_column_text]<div class=\"gem-image gem-wrapbox gem-wrapbox-style-default gem-wrapbox-position-below desktop-infographic thegem-custom-69d0e341ec63c6245\"  style=\"width: 100%;\" ><div class=\"gem-wrapbox-inner \" ><img class=\"gem-wrapbox-element img-responsive\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/10\/Phishing-graf-1-eng-01.svg\" alt=\"\"\/><\/div><\/div><div class=\"gem-image gem-wrapbox gem-wrapbox-style-default gem-wrapbox-position-below mobile-infographic thegem-custom-69d0e341ed09d733\"  style=\"width: 100%;\" ><div class=\"gem-wrapbox-inner \" ><img class=\"gem-wrapbox-element img-responsive\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/10\/Phishing-graf-1-eng-mob-01.svg\" alt=\"\"\/><\/div><\/div><div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341ed454 {margin-bottom: 20px !important;}<\/style><div id=\"thegem-divider-69d0e341ed454\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d0e341ed5771308\" ><h2 id=\"thegem-heading-69d0e341ed544\" class=\"thegem-heading title-h5 vc_custom_1750929956297\" style=\"text-align: left;\" ><span>Learning Through Real-World Experience<\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d0e341ed544 {margin: 0;}#thegem-heading-69d0e341ed544 a:hover, #thegem-heading-69d0e341ed544 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ed5771308{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ed5771308{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ed5771308{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ed5771308{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]Instead of traditional theoretical training, your employees gain hands-on experience in recognizing and responding to phishing attempts. They receive immediate interactive feedback and educational materials that explain mistakes and teach them how to prevent similar attacks in the future. This way, phishing tests become not only a risk assessment tool \u2013 but also a powerful mechanism for continuous learning and strengthening your organization\u2019s cybersecurity.[\/vc_column_text]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341ed5e4 {margin-bottom: 20px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d0e341ed5e4 {display: none;}}<\/style><div id=\"thegem-divider-69d0e341ed5e4\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d0e341ed7013214\" ><h2 id=\"thegem-heading-69d0e341ed6d6\" class=\"thegem-heading title-h5 vc_custom_1750930023334\" style=\"text-align: left;\" ><span>Reports as a Strategic Security Tool<\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d0e341ed6d6 {margin: 0;}#thegem-heading-69d0e341ed6d6 a:hover, #thegem-heading-69d0e341ed6d6 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ed7013214{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ed7013214{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ed7013214{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ed7013214{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]After each simulation, we deliver comprehensive reports analyzing employee responses, identifying the weakest points, and providing clear recommendations for security improvements. Based on this data, you can make informed decisions on further protection measures, targeted training, and risk reduction strategies.[\/vc_column_text]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341ed759 {margin-bottom: 20px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d0e341ed759 {display: none;}}<\/style><div id=\"thegem-divider-69d0e341ed759\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d0e341ed86f3531\" ><h3 id=\"thegem-heading-69d0e341ed83e\" class=\"thegem-heading title-h6 vc_custom_1757661861820\" style=\"text-align: left;\" ><span class=\"colored\" style=\"color: #2A55A2;\">Our platform provides all the necessary features for phishing campaigns:<\/span><\/h3><style type=\"text\/css\">#thegem-heading-69d0e341ed83e {margin: 0;}#thegem-heading-69d0e341ed83e {font-size: 18px;}#thegem-heading-69d0e341ed83e, #thegem-heading-69d0e341ed83e .light {text-transform: none;}#thegem-heading-69d0e341ed83e a:hover, #thegem-heading-69d0e341ed83e a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ed86f3531{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ed86f3531{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ed86f3531{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ed86f3531{position: relative !important;}}<\/style>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_disable_tablet=&#8221;1&#8243; el_disable_mobile=&#8221;1&#8243;][vc_column]<div class=\"gem-image gem-wrapbox gem-wrapbox-style-default gem-wrapbox-position-below desktop-infographic thegem-custom-69d0e341ed8ca622\"  style=\"width: 100%;\" ><div class=\"gem-wrapbox-inner \" ><img class=\"gem-wrapbox-element img-responsive\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/10\/Phishing-graf-2-eng-01.svg\" alt=\"\"\/><\/div><\/div>[\/vc_column][\/vc_row][vc_row el_disable_desktop=&#8221;1&#8243; css=&#8221;.vc_custom_1750752161705{margin-top: -40px !important;margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column]<div class=\"gem-image gem-wrapbox gem-wrapbox-style-default gem-wrapbox-position-below mobile-infographic thegem-custom-69d0e341edcf02574\"  style=\"width: 100%;\" ><div class=\"gem-wrapbox-inner \" ><img class=\"gem-wrapbox-element img-responsive\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/10\/Phishing-graf-2-eng-mob-01.svg\" alt=\"\"\/><\/div><\/div>[\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341ee0ba {margin-top: -100px !important;}#thegem-divider-69d0e341ee0ba {margin-bottom: 50px !important;}@media screen and (min-width: 1024px) {#thegem-divider-69d0e341ee0ba {display: none;}}@media screen and (max-width: 1023px) and (min-width: 768px) {#thegem-divider-69d0e341ee0ba {display: none;}}<\/style><div id=\"thegem-divider-69d0e341ee0ba\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d0e341ee23e2944\" ><h2 id=\"thegem-heading-69d0e341ee1fa\" class=\"thegem-heading title-h5 vc_custom_1750930152810\" style=\"text-align: left;\" ><span>How We Run Phishing Campaigns <\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d0e341ee1fa {margin: 0;}#thegem-heading-69d0e341ee1fa a:hover, #thegem-heading-69d0e341ee1fa a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ee23e2944{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ee23e2944{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ee23e2944{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ee23e2944{position: relative !important;}}<\/style><div class=\"gem-image gem-wrapbox gem-wrapbox-style-default gem-wrapbox-position-below  thegem-custom-69d0e341ee2b18009\"  style=\"width: 100%;\" ><div class=\"gem-wrapbox-inner \" ><img class=\"gem-wrapbox-element img-responsive\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/10\/Phishing-graf-3-eng_Mesa-de-trabajo-1.svg\" alt=\"\"\/><\/div><\/div><div class=\"thegem-te-heading thegem-custom-69d0e341ee7b26996\" ><h2 id=\"thegem-heading-69d0e341ee77f\" class=\"thegem-heading title-h5 vc_custom_1750930197896\" style=\"text-align: left;\" ><span>More Security \u2013 Fewer Frauds and Risks<\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d0e341ee77f {margin: 0;}#thegem-heading-69d0e341ee77f a:hover, #thegem-heading-69d0e341ee77f a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ee7b26996{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ee7b26996{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ee7b26996{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ee7b26996{position: relative !important;}}<\/style><div class=\"thegem-te-heading thegem-custom-69d0e341ee9536211\" ><h3 id=\"thegem-heading-69d0e341ee8f3\" class=\"thegem-heading title-h6 vc_custom_1757661927572\" style=\"text-align: left;\" ><span class=\"colored\" style=\"color: #2A55A2;\">Enhance your cyber resilience!<\/span><\/h3><style type=\"text\/css\">#thegem-heading-69d0e341ee8f3 {margin: 0;}#thegem-heading-69d0e341ee8f3 {font-size: 18px;}#thegem-heading-69d0e341ee8f3, #thegem-heading-69d0e341ee8f3 .light {text-transform: none;}#thegem-heading-69d0e341ee8f3 a:hover, #thegem-heading-69d0e341ee8f3 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ee9536211{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ee9536211{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e341ee9536211{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e341ee9536211{position: relative !important;}}<\/style><div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341ee9ba {margin-bottom: 20px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d0e341ee9ba {display: none;}}<\/style><div id=\"thegem-divider-69d0e341ee9ba\" class=\"gem-divider  \" style=\"\" ><\/div><style type=\"text\/css\">.thegem-button-69d0e341eeae94262 .gem-button {font-size: 16px;margin-top: 5px;margin-bottom: 5px;}.thegem-button-69d0e341eeae94262 .gem-button svg {fill: #FFFFFF;}.thegem-button-69d0e341eeae94262 .gem-button:hover svg {fill: #FFFFFF;}<\/style><div class=\"gem-button-container gem-button-position-inline thegem-button-69d0e341eeae94262    \"  ><a title=\"Contact\" class=\"gem-button gem-button-size-medium gem-button-style-flat gem-button-text-weight-normal gem-button-icon-position-right\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 4px;background-color: #56ADE4;color: #FFFFFF;\" onmouseleave=\"this.style.backgroundColor='#56ADE4';this.style.color='#FFFFFF';\" onmouseenter=\"this.style.backgroundColor='#2A55A2';this.style.color='#FFFFFF';\" href=\"https:\/\/saga.rs\/en\/contact\/\" target=\"_self\">Request your consultation<i class=\"gem-print-icon gem-icon-pack-elegant \">&#x39;<\/i><\/a><\/div> <div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e341eeb73 {margin-bottom: 100px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d0e341eeb73 {margin-bottom: 50px !important;}}<\/style><div id=\"thegem-divider-69d0e341eeb73\" class=\"gem-divider  \" style=\"\" ><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row custom_css_code=&#8221;JTJGJTJBJTIwTGlzdCUyMEl0ZW0lMjAlMkElMkYlMEEucG9zdC1icmVhZGNydW1icyUyMHVsJTIwbGklM0FudGgtY2hpbGQlMjgxJTI5JTdCJTBBJTA5cGFkZGluZy1sZWZ0JTNBMHB4JTNCJTBBJTA5JTBBJTdEJTBBJTBB&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; el_sticky=&#8221;1&#8243; el_sticky_offset=&#8221;130px&#8221;][vc_column_text css=&#8221;&#8221;]Anticipate vulnerabilities before&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":19630,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-19664","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing Campaigns - Saga<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Campaigns - Saga\" \/>\n<meta property=\"og:description\" content=\"[vc_row custom_css_code=&#8221;JTJGJTJBJTIwTGlzdCUyMEl0ZW0lMjAlMkElMkYlMEEucG9zdC1icmVhZGNydW1icyUyMHVsJTIwbGklM0FudGgtY2hpbGQlMjgxJTI5JTdCJTBBJTA5cGFkZGluZy1sZWZ0JTNBMHB4JTNCJTBBJTA5JTBBJTdEJTBBJTBB&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; el_sticky=&#8221;1&#8243; el_sticky_offset=&#8221;130px&#8221;][vc_column_text css=&#8221;&#8221;]Anticipate vulnerabilities before...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/\" \/>\n<meta property=\"og:site_name\" content=\"Saga\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-02T10:48:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/\",\"url\":\"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/\",\"name\":\"Phishing Campaigns - Saga\",\"isPartOf\":{\"@id\":\"https:\/\/saga.rs\/#website\"},\"datePublished\":\"2025-06-26T09:11:02+00:00\",\"dateModified\":\"2025-10-02T10:48:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/saga.rs\/en\/sample-page-2\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\",\"item\":\"https:\/\/saga.rs\/en\/cyber-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Phishing Campaigns\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/saga.rs\/#website\",\"url\":\"https:\/\/saga.rs\/\",\"name\":\"Saga\",\"description\":\"A Noventiq Company\",\"publisher\":{\"@id\":\"https:\/\/saga.rs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/saga.rs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/saga.rs\/#organization\",\"name\":\"Saga A Noventiq Company\",\"url\":\"https:\/\/saga.rs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"contentUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"width\":1596,\"height\":450,\"caption\":\"Saga A Noventiq Company\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\",\"https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs\",\"https:\/\/www.instagram.com\/saga_beograd\/\",\"https:\/\/www.youtube.com\/@SagaBeograd\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing Campaigns - Saga","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/","og_locale":"en_US","og_type":"article","og_title":"Phishing Campaigns - Saga","og_description":"[vc_row custom_css_code=&#8221;JTJGJTJBJTIwTGlzdCUyMEl0ZW0lMjAlMkElMkYlMEEucG9zdC1icmVhZGNydW1icyUyMHVsJTIwbGklM0FudGgtY2hpbGQlMjgxJTI5JTdCJTBBJTA5cGFkZGluZy1sZWZ0JTNBMHB4JTNCJTBBJTA5JTBBJTdEJTBBJTBB&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; el_sticky=&#8221;1&#8243; el_sticky_offset=&#8221;130px&#8221;][vc_column_text css=&#8221;&#8221;]Anticipate vulnerabilities before...","og_url":"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/","og_site_name":"Saga","article_publisher":"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","article_modified_time":"2025-10-02T10:48:12+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/","url":"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/","name":"Phishing Campaigns - Saga","isPartOf":{"@id":"https:\/\/saga.rs\/#website"},"datePublished":"2025-06-26T09:11:02+00:00","dateModified":"2025-10-02T10:48:12+00:00","breadcrumb":{"@id":"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/saga.rs\/en\/cyber-security\/phishing-campaigns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/saga.rs\/en\/sample-page-2\/"},{"@type":"ListItem","position":2,"name":"Cyber Security","item":"https:\/\/saga.rs\/en\/cyber-security\/"},{"@type":"ListItem","position":3,"name":"Phishing Campaigns"}]},{"@type":"WebSite","@id":"https:\/\/saga.rs\/#website","url":"https:\/\/saga.rs\/","name":"Saga","description":"A Noventiq Company","publisher":{"@id":"https:\/\/saga.rs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/saga.rs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/saga.rs\/#organization","name":"Saga A Noventiq Company","url":"https:\/\/saga.rs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/","url":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","contentUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","width":1596,"height":450,"caption":"Saga A Noventiq Company"},"image":{"@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs","https:\/\/www.instagram.com\/saga_beograd\/","https:\/\/www.youtube.com\/@SagaBeograd"]}]}},"_links":{"self":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages\/19664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/comments?post=19664"}],"version-history":[{"count":6,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages\/19664\/revisions"}],"predecessor-version":[{"id":21052,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages\/19664\/revisions\/21052"}],"up":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages\/19630"}],"wp:attachment":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/media?parent=19664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}