Cybersecurity and Applied AI career intelligence
© 2026 Bespoke Intermedia LLC
Founded by Julian Calvo, Ed.D., M.S.
Voice + phishing; rhymes with 'fishing'.
Voice phishing, a social engineering attack conducted over phone calls. Attackers impersonate IT support, banks, or government agencies to extract sensitive information or convince targets to install remote access software. Caller ID spoofing makes vishing calls appear to come from legitimate numbers.
Why this matters in 2026
Scattered Spider's 10-minute vishing call to MGM's IT help desk in September 2023 produced $100M in Q3 EBITDAR loss + 10-day Las Vegas Strip shutdown. Caesars was hit on the same playbook days later. CISA's January 2025 help-desk security guidance is a direct downstream output.
Read the full Decipher File →What hiring managers ask about this
Penetration-test and IR interviews ask candidates to design a help-desk identity-verification protocol that survives a Scattered-Spider-style vishing call. The FIDO Identity Verification specification is the reference standard.
Vishing attacks bypass email security controls entirely, making them a growing concern for cybersecurity teams. Penetration testers include vishing in social engineering assessments. SOC analysts handle vishing reports from employees. Organizations increasingly need security awareness training that covers voice-based threats.
Voice phishing, a social engineering attack conducted over phone calls. Attackers impersonate IT support, banks, or government agencies to extract sensitive information or convince targets to install remote access software. Caller ID spoofing makes vishing calls appear to come from legitimate numbers.
Vishing attacks bypass email security controls entirely, making them a growing concern for cybersecurity teams. Penetration testers include vishing in social engineering assessments. SOC analysts handle vishing reports from employees. Organizations increasingly need security awareness training that covers voice-based threats.
Cybersecurity professionals who work with Vishing include Penetration Tester, SOC Analyst, Incident Responder. These roles apply Vishing knowledge within the Offensive Security domain.
Definitions are original explanations written for career development purposes. For authoritative technical definitions, refer to NIST, ISO, or the relevant standards body.
Was this page helpful?
Join cybersecurity professionals receiving weekly intelligence on threats, job market trends, salary data, and career growth strategies.
Weekly insights on threats, job trends, and career growth.
Unsubscribe anytime. More options