Skip to content

Phishing 2026: The New Techniques That Fool Even Professionals (and How to Spot Them)

BellosatoTech Security Team

Phishing 2026: The New Techniques That Fool Even Professionals

Think about the last phishing email you recognised. It probably had something obviously wrong with it: a sender from a strange domain, approximate grammar, an absurd request awkwardly phrased. You deleted it without thinking twice.

That was the phishing of yesterday. Today’s is different — much harder to recognise, far more personalised, and backed by artificial intelligence tools that have rendered obsolete many of the rules we learned to defend ourselves.

This guide offers an honest, up-to-date picture of how phishing works in 2026, which techniques are most commonly used, and — most importantly — what can be done concretely, acknowledging that technology alone is not enough.


Table of Contents

  1. What phishing is and why it still works
  2. Spear phishing: when the attack is tailored to you
  3. Smishing and vishing: beyond emails
  4. AI-generated phishing: indistinguishable from the genuine article
  5. QR code phishing: the vector many underestimate
  6. The signals that still work for recognising it
  7. How to protect yourself: people, processes, and technology
  8. FAQ

1. What Phishing Is and Why It Still Works

Phishing is a deception technique: someone pretends to be a trusted person or organisation to convince you to do something you would not do if you knew who you were actually dealing with. Entering credentials on a fake site. Transferring money. Opening an attachment that installs malware. Providing confidential information.

It is not a technical vulnerability — it is a human vulnerability. And human vulnerabilities do not update the way software does.

The data is clear: phishing remains the number one cause of business data breaches globally, year after year. Not because people are foolish or careless — but because attacks have evolved specifically to exploit the cognitive mechanisms that guide our everyday decisions: trust in apparently authoritative sources, the tendency to act quickly under pressure, and the normalcy bias that leads us to interpret situations as “probably fine.”


2. Spear Phishing: When the Attack Is Tailored to You

Traditional phishing is a net cast across millions of people: an identical email to everyone, hoping someone takes the bait. Spear phishing is different — it is a harpoon directed at one specific person.

Those conducting a spear phishing attack spend time gathering information about the target: full name, job title, colleagues’ names, ongoing projects, clients, suppliers. They then construct a message that uses this information to appear entirely legitimate.

A realistic example: Sarah, an accounts manager at a manufacturing company, receives an email apparently from her line manager. The email uses her name, references a project they are working on together, mentions a real supplier they deal with, and asks her to advance a payment because “there are issues with the scheduled transfer.” The request is urgent, and the tone is familiar.

All of the information used is publicly available: LinkedIn, the company website, press releases, social media posts. No hacking required — just collecting and connecting the dots.

Today this information-gathering process is automated by AI in seconds, making it possible to conduct spear phishing against hundreds of targets simultaneously with the same level of personalisation that previously required hours of manual work per individual target.


3. Smishing and Vishing: Beyond Emails

Phishing is not limited to emails. Two variations have grown significantly:

Smishing (SMS phishing): text messages have much higher open rates than emails — around 98% versus 20 to 30% for emails. And most people are less guarded against SMS than against emails, partly because they have developed mental filters for suspicious emails but not equally so for messages.

A text apparently from a courier saying your parcel is held up and you need to enter your details to release it. A message from your bank flagging suspicious activity and asking you to verify your account access. A streaming service notification asking you to update your payment details. These messages receive clicks far more often than one might expect.

Vishing (voice phishing): phone calls in which someone pretends to be a bank operator, a tax authority official, or a technical support agent. Powered by AI voice cloning, vishing has reached a level where the caller can sound like a colleague, a family member, or a company executive the target knows well.


4. AI-Generated Phishing: Indistinguishable from the Genuine Article

This is the most significant transformation of the past two years, and it deserves specific attention.

AI language models generate fluent, grammatically flawless, contextually appropriate text in any language. This has eliminated one of the most reliable signals for recognising phishing: the quality of the writing.

But AI does more than that. It can:

  • Mimic a specific person’s writing style, by analysing their emails or public posts. A message that imitates how a CEO writes, with their typical phrases, habitual greetings, and narrative rhythm, is far more convincing than a generic one.

  • Adapt content in real time during a conversation: phishing chatbots can sustain a credible conversation for several exchanges, responding contextually to the target’s questions before arriving at the critical request.

  • Create high-quality fake websites — perfect copies of banking sites, e-commerce platforms, or cloud services that function seamlessly, complete with valid SSL certificates. The familiar padlock icon in the browser no longer means “this site is trustworthy” — it only means the connection is encrypted.


5. QR Code Phishing: The Vector Many Underestimate

There is one attack vector that has grown enormously in recent years precisely because many traditional technical defences do not cover it: quishing, or phishing via QR code.

A QR code in an email, a document, a flyer, or a poster can point to any URL — and most people cannot see the destination URL before scanning it. Anti-phishing filters that analyse links in emails see nothing suspicious in a QR code.

The mechanism is simple: you scan the QR code with your phone, you are taken to a phishing site that asks for your credentials, and the mobile device — typically less protected than a corporate computer — becomes the entry point.

This vector is particularly effective in corporate environments where QR codes are used for internal procedures, meeting access, or shared documents. An internal email inviting you to scan a QR code to access “an updated document” or “the new version of a contract” is a credible and under-monitored attack vector.


6. The Signals That Still Work for Recognising It

Despite the evolution of techniques, some signals remain valid even in 2026:

Artificial urgency — Phishing almost always creates time pressure: “you must act within 24 hours,” “your account will be blocked,” “urgent transfer, I cannot be reached by phone.” The urgency is designed to bypass critical thinking. A practical rule: the more a message pushes you to act quickly, the more it is worth pausing to verify.

Requests that bypass normal processes — A CEO asking for an urgent transfer that skips the procurement process. A message asking you not to discuss the matter with anyone else. An “exceptional” procedure requiring you to act outside normal channels. These are warning signals regardless of how legitimate the source appears.

Domain slightly different from the original — Even with flawless text, attackers must use a domain different from the original. bellosato.tech is real. bellosato-tech.com, bellosatotech.net, bel1osato.tech are potential traps. A difference of a few characters — one letter changed, a hyphen added — that goes unnoticed in a quick read.

Requests for credentials out of context — No legitimate service asks you to enter credentials by clicking a link in an email. If you receive a message leading you to a login page, go directly to the site by typing the address in your browser instead of clicking the link.


7. How to Protect Yourself: People, Processes and Technology

Effective defence against phishing is not built on a single layer. It requires an integrated approach across three dimensions.

People — the most important and most neglected defence

Technology can filter some attacks, but those who attack know how to circumvent it. The person who receives the message is the last line of defence — and must be equipped for that role.

Training people does not mean running a course once a year. It means building habits: the habit of verifying by phone before executing any unusual request received by email; the habit of checking the sender’s domain in full; the habit of not opening unexpected attachments without first confirming the legitimacy of the request.

Processes — the rules that do not depend on technology

Some procedural rules dramatically reduce risk, regardless of how sophisticated the attacks are:

  • Any bank transfer above a defined threshold requires a phone confirmation with the requester, on a known number — not the one provided in the email
  • Credentials are never shared via email or messages, under any circumstances
  • Urgent and unusual requests are treated as a warning signal, not as a reason to act quickly

Technology — necessary but not sufficient

Two-factor authentication (2FA) is the technical measure with the best cost-to-benefit ratio against phishing. Even if an attacker obtains credentials, without the second factor they cannot access the account. On all accounts managing sensitive data — business email, site management, cloud services, online banking — 2FA should not be optional.

Advanced anti-phishing email filters at the server level, DNS filtering solutions that block known phishing domains, and access monitoring systems complete the picture — but they come after people and processes, not in place of them.


FAQ

Why do phishing emails bypass spam filters?

Spam filters recognise known patterns: blacklisted senders, links to domains known to be malicious, content with characteristics typical of spam. Spear phishing attacks use recently registered domains (not yet on blacklists), personalised content (without typical spam patterns), and sometimes compromised legitimate email accounts. An email arriving from a real Gmail account belonging to a compromised supplier is not filtered as spam — because technically it is not.

Does 2FA really protect against phishing?

Standard 2FA (code via SMS or authenticator app) protects against attacks where the attacker obtains credentials but does not have physical access to the device. However, advanced real-time man-in-the-middle phishing techniques can circumvent even traditional 2FA. Hardware security keys (such as YubiKey) offer superior protection. For most business contexts, authenticator app 2FA is nonetheless a significant improvement over having no second factor at all.

Not necessarily. Some phishing pages attempt to exploit browser vulnerabilities to execute code on page load, without requiring any action from the user. If you have opened a suspicious link, it is prudent to: immediately update your browser and operating system if they are not at the latest version, run a scan with an up-to-date anti-malware tool, and monitor your accounts in the following days for any anomalous activity.

How do I verify whether an email is genuine without clicking anything?

Hover your mouse (without clicking) over the sender to see the full address, not just the display name. Check the email’s full headers to see which servers it passed through. If you have doubts, do not reply to the email — contact the sending organisation directly using contacts you already know (official website, official phone number). Never use the contact details provided within the suspicious email itself.

My company is small — are we really a phishing target?

Mass phishing does not choose targets: it reaches anyone with an email address. Spear phishing typically aims at businesses with financial resources or data of value — but “value” is not synonymous with “large”: a small professional services firm, an e-commerce store, a medical or legal practice all handle data worth considerable sums on the dark web. And smaller companies are often easier targets because they have fewer formal protections in place.


Want to understand how well prepared your team is to recognise a sophisticated phishing attack? We run practical training sessions and controlled attack simulations to measure and improve security awareness. Contact us

phishing 2026 ai phishing how to recognise phishing spear phishing smishing vishing phishing protection business phishing