Cyberstats

Security Intelligence

TopicsVendorsBlogSearchGet fresh stats weekly
VendorsTalos

Talos

Cybersecurity reports and statistics published by Talos

4 categories1 reports

Research Reports

Reports and publications from Talos

PDFs: Portable documents, or perfect deliveries for phish?

7/2/2025

Recent Statistics & Reports

Most phone numbers found in email threats leveraging the TOAD social engineering technique are Voice over Internet Protocol (VoIP) numbers.

7/2/2025•
PhishingTOAD

Microsoft and Docusign were among the most frequently impersonated brands in phishing emails with PDF attachments.

7/2/2025•
PhishingTOADPDF

NortonLifeLock, PayPal, and Geek Squad were among the most impersonated brands in TOAD emails with PDF attachments

7/2/2025•
PhishingTOADPDF

A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, employing Telephone-Oriented Attack Delivery (TOAD) or callback phishing.

7/2/2025•
PhishingTOAD

Phone numbers are sometimes reused on consecutive days in TOAD attacks.

7/2/2025•
PhishingTOAD

Top Categories

Phishing
5
TOAD
5
PDF
2
Impersonation
2

Related Vendors

RSA
19 stats
Cision PR Newswire
21 stats
KnowBe4
3 stats
Microsoft
16 stats
CROWDSTRIKE
79 stats
Norton
36 stats
Cyberstats

Fresh, direct cybersecurity statistics, trends and market data. No fluff.

Get Started

Sign Up Free

Join 1,000+ security professionals

Stay Updated

Get weekly cybersecurity insights

© 2025 Cyberstats. All rights reserved.

Privacy PolicyTerms of ServiceSitemap