{"id":24748,"date":"2025-10-30T10:23:48","date_gmt":"2025-10-30T09:23:48","guid":{"rendered":"https:\/\/defenderbox.de\/?p=24748"},"modified":"2026-03-11T17:45:45","modified_gmt":"2026-03-11T16:45:45","slug":"recognize-phishing","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/phishing-erkennen\/","title":{"rendered":"Recognize phishing scams..."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"24748\" class=\"elementor elementor-24748\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2687284a e-con-full e-flex e-con e-parent\" data-id=\"2687284a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a25ec1c elementor-widget elementor-widget-text-editor\" data-id=\"3a25ec1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\">... and avoid: 6 warning signs<\/h2>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p style=\"font-weight: 400;\">Phishing scams are an increasingly common aspect of everyday life. These malicious emails are probably in the spam folder of your email account right now, waiting to be opened.<\/p>\n<p style=\"font-weight: 400;\">The volume of phishing attacks has doubled since 2024. This shows the scale of phishing activity worldwide and how easy it is to carry out a phishing attack. As these attacks become more common for businesses, here are 6 warning signs to look out for to recognize if a message is legitimate or if it's a phishing scam.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading --><\/p>\n<h3 class=\"wp-block-heading\"><span style=\"color: #000000;\">1. sense of urgency<\/span><\/h3>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p style=\"font-weight: 400;\">Scammers try to create a sense of urgency to get you to act quickly - usually with something that is supposedly time-sensitive. By threatening negative consequences, attackers can speed up your response and prevent you from recognizing discrepancies in the email. A good rule of thumb is to stop and think before you click on a link! Those who contact you by email rarely need a response so quickly<em>.<\/em><\/p>\n<h3><span style=\"color: #000000;\">2. unexpected communication<\/span>\u00a0<\/h3>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p style=\"font-weight: 400;\">Is an e-mail you have received to be expected? Scammers often pretend to be someone you know, such as a boss or colleague. But what if you don't normally communicate with the sender by email? And even if you do, why are they sending this message today?<\/p>\n<p style=\"font-weight: 400;\">Think about why an email appears unexpectedly in your inbox before you click on it. If the email appears to be from someone you know, contact that person by other means, such as in person or by phone call, to verify.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading --><\/p>\n<h3 class=\"wp-block-heading\"><span style=\"color: #000000;\">3. grammatical errors<\/span><\/h3>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p>You will find spelling mistakes in spam emails - unfortunately not so often anymore due to AI - especially if they come from another country where English is the second language. Watch out for incorrect apostrophes or incorrect wording, as many companies use spell-check tools to ensure professionalism.<\/p>\n<p style=\"font-weight: 400;\">One or two mistakes can be human, but too many can indicate something worse than an unnoticed spelling error.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading --><\/p>\n<h3 class=\"wp-block-heading\"><span style=\"color: #000000;\">4. malicious links<\/span><\/h3>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p style=\"font-weight: 400;\">Phishers often use shortened links and URL encoding to hide the true destination of a link. Don't click on a link if you're not sure where it will take you - use a link expansion or URL decoding tool to check a suspicious link.<\/p>\n<p style=\"font-weight: 400;\">Remember that just visiting a malicious website, even if you don't actively click on a link to download anything, can be enough to deliver malware to your computer.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading --><\/p>\n<h3 class=\"wp-block-heading\"><span style=\"color: #000000;\">5. questions about sensitive data<\/span><\/h3>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p style=\"font-weight: 400;\">If you receive an email asking you to send sensitive information, especially personal or financial information, delete the email immediately. Hackers can create fake login pages that resemble the real, original pages. They can also use emails to request payments.<\/p>\n<p style=\"font-weight: 400;\">Attackers can use this information to further harm you or your organization, and legitimate sources should have other, more secure ways to access this data.<\/p>\n<h3><span style=\"color: #000000;\">6. suspicious e-mail addresses<\/span>\u00a0<\/h3>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p style=\"font-weight: 400;\">Check the sender's address to make sure the email is actually from the person it claims to be. Display names can be manipulated, so be sure to check that they are genuine.<\/p>\n<p style=\"font-weight: 400;\">Typical signs that an email may have been sent by a hacker include certain letters that have been replaced by similar-looking letters (e.g. a for \u201ea\u201c) or numbers (e.g. \u201e0\u201c for \u201eo\u201c) and the use of special characters.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading --><\/p>\n<h4 class=\"wp-block-heading\"><span style=\"color: #000000;\">AI has accelerated phishing attacks<\/span><\/h4>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p style=\"font-weight: 400;\">AI has fundamentally changed the way companies operate, from consumer communication to data analysis. But these aren't the only groups using the advanced technology. Hackers and black marketers are using AI to create phishing attacks that are more targeted, more convincing and harder to detect.<\/p>\n<p style=\"font-weight: 400;\">Cybercriminals are now using AI to create highly personalized phishing messages by analyzing vast amounts of publicly available data from social media, professional networks and online activity. These AI-generated emails and messages mimic the tone, style and content of legitimate communications, increasing the likelihood of success.<\/p>\n<p style=\"font-weight: 400;\">In addition, AI-driven phishing campaigns can dynamically adapt to their targets. Machine learning algorithms evaluate the effectiveness of initial attempts and refine strategies in real time by adjusting content or timing to exploit vulnerabilities.<\/p>\n<p style=\"font-weight: 400;\">In addition, AI-powered phishing kits allow attackers to bypass traditional security measures such as spam filters by creating constantly evolving email formats and bypassing natural language processing detection. Phishing attacks are not only more sophisticated, but also more accessible. With AI, even an inexperienced hacker can easily launch complex phishing attacks.<\/p>\n<p style=\"font-weight: 400;\">This combination of sophistication, accessibility and scalability has taken phishing to a new level of effectiveness, posing significant challenges to individuals and organizations alike.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading --><\/p>\n<h4 class=\"wp-block-heading\"><span style=\"color: #000000;\">Summary<\/span><\/h4>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p style=\"font-weight: 400;\">When it comes to staying safe online, whether at work or as an individual user, it's crucial to recognize and avoid phishing scams. As AI continues to advance rapidly, providing even inexperienced hackers with sophisticated tools, and we see an increase in phishing attacks year on year, it's more important than ever to be cyber security aware.<\/p>\n<p style=\"font-weight: 400;\">Businesses and individuals should first do what they can by installing an anti-virus program and firewall, using a password manager and, most importantly, knowing the tell-tale signs of a phishing email so they can be sure to avoid them all.<\/p>\n<p style=\"font-weight: 400;\">Together with our partner <a href=\"https:\/\/defenderbox.de\/en\/phished\/\"><strong data-start=\"310\" data-end=\"325\">Phishing.io<\/strong><\/a> we help companies to specifically sensitize employees and prepare them for email attacks in a practical way:<br data-start=\"445\" data-end=\"448\" \/><br \/>While\u00a0<strong><a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a><\/strong>\u00a0automatically detects suspicious activities and technically defends against attacks, ensures\u00a0<a href=\"https:\/\/defenderbox.de\/en\/partner\/\" target=\"_blank\" rel=\"noopener\">Phishing.io<\/a>\u00a0with realistic simulations and training to ensure that teams learn to recognize suspicious emails at an early stage - before damage occurs.<\/p>\n<p style=\"font-weight: 400;\">This creates holistic protection: <span style=\"color: #3366ff;\">Technology meets consciousness.<\/span><\/p>\n<p>With the <a href=\"https:\/\/defenderbox.de\/en\/product\/\" target=\"_blank\" rel=\"noopener\">DEFENDERBOX<\/a> we offer companies a proactive approach to cyber security:<\/p>\n<ul>\n<li>Continuous scanning of the entire infrastructure<\/li>\n<li>Detecting security vulnerabilities before attackers exploit them<\/li>\n<li>Clear recommendations for technical and organizational measures<\/li>\n<li>Integration of security checks into existing processes and audits<\/li>\n<\/ul>\n<p data-start=\"6223\" data-end=\"6329\">In this way, we help companies to turn IT security from a purely IT issue into a strategic success factor.<\/p>\n<p data-start=\"3266\" data-end=\"3322\">\ud83d\udc49 Do you want to know how your IT security is doing? Find out now <a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\">here<\/a> Start cyber check.\u00a0<\/p>\n<p data-start=\"3266\" data-end=\"3322\"><strong>Stay vigilant - your IT will stay that way with us.<\/strong><\/p>\n<div>\n<p>\u27a1\ufe0f\u00a0<a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noopener\">Test now<\/a><br \/>\u27a1\ufe0f <a href=\"https:\/\/defenderbox.de\/en\/partner\/\" target=\"_blank\" rel=\"noopener\">Become a partner<\/a><br \/>\u27a1\ufe0f\u00a0<a href=\"https:\/\/defenderbox.de\/en\/career\/\" target=\"_blank\" rel=\"noopener\">Career with us<\/a><\/p>\n<\/div>\n<div class=\"wp-block-buttons\">\n<p><!-- \/wp:button --><!-- wp:button {\"className\":\"is-style-fill\",\"style\":{\"typography\":{\"fontSize\":\"15px\"}}} --><\/p>\n<\/div>\n<p><!-- \/wp:separator --><!-- wp:latest-posts {\"displayPostContent\":true,\"displayPostDate\":true} \/--><\/p>\n<p><!-- \/wp:column --><\/p>\n<p><!-- \/wp:columns --><\/p>\n<p><!-- \/wp:group --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Phishing attacks have doubled since 2024 - and with AI-supported scams, they are becoming increasingly difficult to detect. But if you know the important warning signals, you can protect yourself and your company!  <\/p>","protected":false},"author":3,"featured_media":24752,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[41,39,38,40,37,36],"class_list":["post-24748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-neues-auf-der-cyberfront","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing Betrug erkennen... - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"Sichern Sie Ihre digitale Infrastruktur mit DEFENDERBOX: Fr\u00fchwarnsystem f\u00fcr Hackerangriffe und Schwachstellen \u2013 f\u00fcr maximale Unternehmensresilienz.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/recognize-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Betrug erkennen... - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"Sichern Sie Ihre digitale Infrastruktur mit DEFENDERBOX: Fr\u00fchwarnsystem f\u00fcr Hackerangriffe und Schwachstellen \u2013 f\u00fcr maximale Unternehmensresilienz.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/recognize-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-30T09:23:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T16:45:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1536\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Phishing Betrug erkennen&#8230;\",\"datePublished\":\"2025-10-30T09:23:48+00:00\",\"dateModified\":\"2026-03-11T16:45:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/\"},\"wordCount\":1069,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ChatGPT-Image-30.-Okt.-2025-10_33_30.png\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/\",\"name\":\"Phishing Betrug erkennen... - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ChatGPT-Image-30.-Okt.-2025-10_33_30.png\",\"datePublished\":\"2025-10-30T09:23:48+00:00\",\"dateModified\":\"2026-03-11T16:45:45+00:00\",\"description\":\"Sichern Sie Ihre digitale Infrastruktur mit DEFENDERBOX: Fr\u00fchwarnsystem f\u00fcr Hackerangriffe und Schwachstellen \u2013 f\u00fcr maximale Unternehmensresilienz.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ChatGPT-Image-30.-Okt.-2025-10_33_30.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ChatGPT-Image-30.-Okt.-2025-10_33_30.png\",\"width\":1024,\"height\":1536,\"caption\":\"Phishing betrug erkennen mit DEFENDERBOX und Phishing.io\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/phishing-erkennen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing Betrug erkennen&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Recognize phishing scams... - DEFENDERBOX","description":"Secure your digital infrastructure with DEFENDERBOX: early warning system for hacker attacks and vulnerabilities - for maximum company resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/recognize-phishing\/","og_locale":"en_US","og_type":"article","og_title":"Phishing Betrug erkennen... - DEFENDERBOX","og_description":"Sichern Sie Ihre digitale Infrastruktur mit DEFENDERBOX: Fr\u00fchwarnsystem f\u00fcr Hackerangriffe und Schwachstellen \u2013 f\u00fcr maximale Unternehmensresilienz.","og_url":"https:\/\/defenderbox.de\/en\/recognize-phishing\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2025-10-30T09:23:48+00:00","article_modified_time":"2026-03-11T16:45:45+00:00","og_image":[{"width":1024,"height":1536,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30.png","type":"image\/png"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/phishing-erkennen\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/phishing-erkennen\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Phishing Betrug erkennen&#8230;","datePublished":"2025-10-30T09:23:48+00:00","dateModified":"2026-03-11T16:45:45+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/phishing-erkennen\/"},"wordCount":1069,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/phishing-erkennen\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30.png","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/phishing-erkennen\/","url":"https:\/\/defenderbox.de\/phishing-erkennen\/","name":"Recognize phishing scams... - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/phishing-erkennen\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/phishing-erkennen\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30.png","datePublished":"2025-10-30T09:23:48+00:00","dateModified":"2026-03-11T16:45:45+00:00","description":"Secure your digital infrastructure with DEFENDERBOX: early warning system for hacker attacks and vulnerabilities - for maximum company resilience.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/phishing-erkennen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/phishing-erkennen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/phishing-erkennen\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/10\/ChatGPT-Image-30.-Okt.-2025-10_33_30.png","width":1024,"height":1536,"caption":"Phishing betrug erkennen mit DEFENDERBOX und Phishing.io"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/phishing-erkennen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Phishing Betrug erkennen&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/24748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=24748"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/24748\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/24752"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=24748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=24748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=24748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}