{"id":11726,"date":"2025-09-16T20:55:12","date_gmt":"2025-09-16T20:55:12","guid":{"rendered":"https:\/\/blog.clickpanda.com\/?p=11726"},"modified":"2025-09-19T19:33:17","modified_gmt":"2025-09-19T19:33:17","slug":"phishing-2025-nuevas-tacticas","status":"publish","type":"post","link":"https:\/\/blog.clickpanda.com\/en\/security\/phishing-2025-new-tactics\/","title":{"rendered":"Phishing 2025: New Tactics and How to Protect Yourself"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11726\" class=\"elementor elementor-11726\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60eb76e e-flex e-con-boxed e-con e-parent\" data-id=\"60eb76e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b25bd4 elementor-widget elementor-widget-heading\" data-id=\"2b25bd4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Introduction<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-431213e elementor-widget elementor-widget-text-editor\" data-id=\"431213e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"504\" data-end=\"802\">The <strong data-start=\"507\" data-end=\"519\">phishing<\/strong> remains one of the most common and effective cyberthreats worldwide. Despite advances in cybersecurity, cybercriminals have perfected their methods to deceive users and companies, causing millions in losses and compromising sensitive information.<\/p><p data-start=\"804\" data-end=\"1189\">At <strong data-start=\"807\" data-end=\"815\">2025<\/strong>phishing tactics have evolved: it is now used for <strong data-start=\"876\" data-end=\"914\">generative artificial intelligence<\/strong>which creates emails and chats that are almost indistinguishable from the real ones; <strong data-start=\"977\" data-end=\"1007\">advanced social engineering<\/strong>capable of manipulating emotions with greater precision; attacks from <strong data-start=\"1073\" data-end=\"1112\">social networks and messaging apps<\/strong>; and even <strong data-start=\"1124\" data-end=\"1186\">real-time impersonations with voice and video deepfakes<\/strong>.<\/p><p data-start=\"1191\" data-end=\"1445\">Faced with this reality, counting on a technological ally such as <strong data-start=\"1253\" data-end=\"1267\">ClickPanda<\/strong> is vital to protect your business. With secure hosting solutions, SSL certificates and specialized support, you can shield your digital presence and reduce fraud risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6e1741 elementor-widget elementor-widget-global elementor-global-11789 elementor-widget-image\" data-id=\"f6e1741\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/clickpanda.com\/es-es\/hosting-ssd?utm_source=blog&#038;utm_medium=banner&#038;utm_campaign=hosting_ssd&#038;utm_term=superior&#038;utm_content=banner2\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-1024x576.png\" class=\"attachment-large size-large wp-image-11788\" alt=\"Promotion SSD 20% discount\" srcset=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-1024x576.png 1024w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-300x169.png 300w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-768x432.png 768w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-1536x864.png 1536w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-18x10.png 18w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9fc401 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-global elementor-global-10394 elementor-widget-table-of-contents\" data-id=\"c9fc401\" data-element_type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__c9fc401\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__c9fc401\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/div>\n\t\t\t\t\t<\/div>\n\t\t<div id=\"elementor-toc__c9fc401\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewbox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f113a9 elementor-widget elementor-widget-text-editor\" data-id=\"0f113a9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>New phishing tactics in 2025<\/h2><h3 data-start=\"1494\" data-end=\"1526\">Phishing with generative AI<\/h3><p data-start=\"1527\" data-end=\"1752\">Attackers use artificial intelligence models to create emails, messages and even live chats that seamlessly mimic the communication of banks, vendors and even co-workers.<\/p><h3 data-start=\"1754\" data-end=\"1807\">Phishing in social networks and messaging apps<\/h3><p data-start=\"1808\" data-end=\"2002\">Cybercriminals take advantage of trust in platforms such as WhatsApp, Facebook or LinkedIn to send malicious links disguised as opportunities, promotions or security alerts.<\/p><h3 data-start=\"2004\" data-end=\"2034\">Voice and video deepfakes<\/h3><p data-start=\"2035\" data-end=\"2221\">Impersonation reaches a new level with falsified videos and audios pretending to be managers, colleagues or family members requesting information or urgent transfers.<\/p><h3 data-start=\"2223\" data-end=\"2255\">Cloned pages with HTTPS<\/h3><p data-start=\"2256\" data-end=\"2449\">The presence of the padlock in the browser no longer guarantees security. Attackers create cloned web sites with <strong data-start=\"2368\" data-end=\"2390\">HTTPS certificates<\/strong> This generates a false sense of confidence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d2030e elementor-widget elementor-widget-text-editor\" data-id=\"0d2030e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Practical tips to prevent phishing<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35ae9c0 elementor-widget elementor-widget-text-editor\" data-id=\"35ae9c0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul data-spread=\"false\" data-pm-slice=\"3 1 []\"><li data-start=\"2507\" data-end=\"2572\"><p data-start=\"2509\" data-end=\"2572\">Activates the <strong data-start=\"2519\" data-end=\"2548\">two-factor authentication (2FA)<\/strong> on all your accounts.<\/p><\/li><li data-start=\"2573\" data-end=\"2644\"><p data-start=\"2575\" data-end=\"2644\">Use <strong data-start=\"2579\" data-end=\"2602\">secure passwords<\/strong> and consider a key manager.<\/p><\/li><li data-start=\"2645\" data-end=\"2708\"><p data-start=\"2647\" data-end=\"2708\">Always check the <strong data-start=\"2667\" data-end=\"2705\">URL before entering credentials<\/strong>.<\/p><\/li><li data-start=\"2709\" data-end=\"2771\"><p data-start=\"2711\" data-end=\"2771\">Educate your team on current phishing tactics.<\/p><\/li><li data-start=\"2772\" data-end=\"2826\"><p data-start=\"2774\" data-end=\"2826\">Keep your <strong data-start=\"2784\" data-end=\"2823\">hosting and updated applications<\/strong>.<br \/><br \/>In addition to implementing best practices such as two-factor authentication and URL verification, enterprises need smarter solutions to deal with advanced attacks. This is where the <strong data-start=\"633\" data-end=\"655\">adaptive defense<\/strong>capable of detecting and responding in real time to phishing attempts and other threats. If you want to delve deeper into this modern approach, check out our article on <a class=\"decorated-link\" href=\"https:\/\/blog.clickpanda.com\/en\/security\/adaptive-defense-detects-responds\/\" target=\"_new\" rel=\"noopener\" data-start=\"824\" data-end=\"962\">Adaptive defense: how to detect and respond to cyber-attacks<\/a><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84dc832 elementor-widget elementor-widget-text-editor\" data-id=\"84dc832\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2833\" data-end=\"2879\">Advantages of ClickPanda against phishing<\/h2><blockquote><ul data-start=\"2881\" data-end=\"3131\"><li data-start=\"2881\" data-end=\"2935\"><p data-start=\"2883\" data-end=\"2935\">Secure hosting with <strong data-start=\"2902\" data-end=\"2932\">free SSL certificates<\/strong>.<\/p><\/li><li data-start=\"2936\" data-end=\"3001\"><p data-start=\"2938\" data-end=\"3001\"><strong data-start=\"2938\" data-end=\"2976\">Web firewall and constant monitoring<\/strong> to detect attacks.<\/p><\/li><li data-start=\"3002\" data-end=\"3058\"><p data-start=\"3004\" data-end=\"3058\"><strong data-start=\"3004\" data-end=\"3028\">24\/7 technical support<\/strong> specialized in security.<\/p><\/li><li data-start=\"3059\" data-end=\"3131\"><p data-start=\"3061\" data-end=\"3131\">Advice on the configuration of <strong data-start=\"3093\" data-end=\"3128\">reliable corporate mailings<\/strong>.<\/p><\/li><\/ul><\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b15e27d elementor-widget elementor-widget-text-editor\" data-id=\"b15e27d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"298\" data-end=\"359\">Why is phishing still so dangerous in 2025?<\/h2><p data-start=\"360\" data-end=\"619\">Phishing has not disappeared because it exploits the weakest link in cybersecurity: <strong data-start=\"449\" data-end=\"465\">the people<\/strong>. No matter how many protection systems a company has, it is enough for a user to click on a fraudulent link to open the door to the attacker.<\/p><p data-start=\"621\" data-end=\"852\">According to recent studies, more than <strong data-start=\"655\" data-end=\"727\">80% of successful cyberattacks start with a phishing email<\/strong>. This demonstrates that this is not only a technological problem, but also a problem of <strong data-start=\"815\" data-end=\"849\">digital awareness and education<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f75184 elementor-widget elementor-widget-text-editor\" data-id=\"9f75184\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"1504\" data-end=\"1553\">Signs to detect a phishing attempt<\/h2><ul data-start=\"1555\" data-end=\"2031\"><li data-start=\"1555\" data-end=\"1643\"><p data-start=\"1557\" data-end=\"1643\"><strong data-start=\"1557\" data-end=\"1579\">Excessive urgency:<\/strong> phrases such as \"Reply now!\" or \"Your account will be suspended\".<\/p><\/li><li data-start=\"1644\" data-end=\"1753\"><p data-start=\"1646\" data-end=\"1753\"><strong data-start=\"1646\" data-end=\"1683\">Writing or grammatical errors:<\/strong> although they are becoming less frequent with AI, they are still clues.<\/p><\/li><li data-start=\"1754\" data-end=\"1843\"><p data-start=\"1756\" data-end=\"1843\"><strong data-start=\"1756\" data-end=\"1782\">Unusual requests:<\/strong> such as money transfers, passwords or access to systems.<\/p><\/li><li data-start=\"1844\" data-end=\"1935\"><p data-start=\"1846\" data-end=\"1935\"><strong data-start=\"1846\" data-end=\"1867\">Suspicious URLs:<\/strong> addresses that look correct but have one letter changed.<\/p><\/li><li data-start=\"1936\" data-end=\"2031\"><p data-start=\"1938\" data-end=\"2031\"><strong data-start=\"1938\" data-end=\"1972\">Unexpected attachments:<\/strong> especially if they are .exe, .zip or documents with macros.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c5a58a elementor-widget elementor-widget-image\" data-id=\"6c5a58a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/clickpanda.com\/certificados-ssl?utm_source=blog&#038;utm_medium=banner&#038;utm_campaign=hosting_ssd&#038;utm_term=superior&#038;utm_content=banner1\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/wordpress-blogs.s3.us-east-2.amazonaws.com\/wp-content\/uploads\/2024\/07\/04214733\/CTA-BLOG-SSL.gif\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8577a56 elementor-widget elementor-widget-text-editor\" data-id=\"8577a56\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2038\" data-end=\"2083\">The real impact of phishing on businesses<\/h2><ul data-start=\"2085\" data-end=\"2437\"><li data-start=\"2085\" data-end=\"2161\"><p data-start=\"2087\" data-end=\"2161\"><strong data-start=\"2087\" data-end=\"2110\">Financial loss:<\/strong> unauthorized transfers or diverted payments.<\/p><\/li><li data-start=\"2162\" data-end=\"2269\"><p data-start=\"2164\" data-end=\"2269\"><strong data-start=\"2164\" data-end=\"2188\">Reputational risk:<\/strong> customers who lose confidence when they learn that their data has been compromised.<\/p><\/li><li data-start=\"2270\" data-end=\"2359\"><p data-start=\"2272\" data-end=\"2359\"><strong data-start=\"2272\" data-end=\"2304\">Interruption of operations:<\/strong> attacks that block access to critical platforms.<\/p><\/li><li data-start=\"2360\" data-end=\"2437\"><p data-start=\"2362\" data-end=\"2437\"><strong data-start=\"2362\" data-end=\"2384\">Legal sanctions:<\/strong> for non-compliance with data protection regulations.<\/p><\/li><\/ul><blockquote><p data-start=\"2439\" data-end=\"2602\">A key fact: the <strong data-start=\"2457\" data-end=\"2555\">average cost of a phishing attack on a medium-sized company exceeds 4 million dollars.<\/strong> between direct losses and collateral damage.<\/p><\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f5013f elementor-widget elementor-widget-text-editor\" data-id=\"3f5013f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2609\" data-end=\"2664\">How to create an anti-phishing culture in your business<\/h2><ol data-start=\"2666\" data-end=\"3151\"><li data-start=\"2666\" data-end=\"2758\"><p data-start=\"2669\" data-end=\"2758\"><strong data-start=\"2669\" data-end=\"2696\">Periodic training:<\/strong> performs phishing simulations to train your team.<\/p><\/li><li data-start=\"2759\" data-end=\"2857\"><p data-start=\"2762\" data-end=\"2857\"><strong data-start=\"2762\" data-end=\"2799\">Clear communication policies:<\/strong> defines that passwords will never be requested by mail.<\/p><\/li><li data-start=\"2858\" data-end=\"2942\"><p data-start=\"2861\" data-end=\"2942\"><strong data-start=\"2861\" data-end=\"2911\">Use of corporate e-mails with authentication:<\/strong> to avoid impersonation.<\/p><\/li><li data-start=\"2943\" data-end=\"3039\"><p data-start=\"2946\" data-end=\"3039\"><strong data-start=\"2946\" data-end=\"2967\">Easy reporting:<\/strong> enables a button or direct channel for reporting suspicious messages.<\/p><\/li><li data-start=\"3040\" data-end=\"3151\"><p data-start=\"3043\" data-end=\"3151\"><strong data-start=\"3043\" data-end=\"3074\">Constant updates:<\/strong> keeping systems and software up to date is key to closing vulnerabilities.<\/p><\/li><\/ol><hr data-start=\"3153\" data-end=\"3156\" \/><h2 data-start=\"3158\" data-end=\"3209\">Tools to help prevent phishing<\/h2><ul data-start=\"3211\" data-end=\"3596\"><li data-start=\"3211\" data-end=\"3318\"><p data-start=\"3213\" data-end=\"3318\"><strong data-start=\"3213\" data-end=\"3245\">Advanced mail filters:<\/strong> block suspicious messages before they reach the inbox.<\/p><\/li><li data-start=\"3319\" data-end=\"3421\"><p data-start=\"3321\" data-end=\"3421\"><strong data-start=\"3321\" data-end=\"3359\">SSL certificates and secure hosting:<\/strong> protect navigation and generate confidence in your customers.<\/p><\/li><li data-start=\"3422\" data-end=\"3518\"><p data-start=\"3424\" data-end=\"3518\"><strong data-start=\"3424\" data-end=\"3452\">Password managers:<\/strong> reduce the practice of reusing passwords in different accounts.<\/p><\/li><li data-start=\"3519\" data-end=\"3596\"><p data-start=\"3521\" data-end=\"3596\"><strong data-start=\"3521\" data-end=\"3545\">Web Firewalls (WAF):<\/strong> detect fraud attempts and malicious traffic.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad4cb69 elementor-widget elementor-widget-text-editor\" data-id=\"ad4cb69\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3175\" data-end=\"3412\">Although suppliers such as <strong data-start=\"3199\" data-end=\"3233\">Hostinger, GoDaddy or Mi.com.co<\/strong> offer basic safety measures, <strong data-start=\"3272\" data-end=\"3286\">ClickPanda<\/strong> stands out for its close accompaniment, local support in Colombia and a specialized focus on protecting digital businesses.<\/p><div class=\"_tableContainer_1rjym_1\"><div class=\"group _tableWrapper_1rjym_13 flex w-fit flex-col-reverse\" tabindex=\"-1\"><table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"3414\" data-end=\"3874\"><thead data-start=\"3414\" data-end=\"3488\"><tr data-start=\"3414\" data-end=\"3488\"><th data-start=\"3414\" data-end=\"3440\" data-col-size=\"sm\">Feature<\/th><th data-start=\"3440\" data-end=\"3453\" data-col-size=\"sm\">ClickPanda<\/th><th data-start=\"3453\" data-end=\"3465\" data-col-size=\"sm\">Hostinger<\/th><th data-start=\"3465\" data-end=\"3475\" data-col-size=\"sm\">GoDaddy<\/th><th data-start=\"3475\" data-end=\"3488\" data-col-size=\"sm\">My.com.co<\/th><\/tr><\/thead><tbody data-start=\"3565\" data-end=\"3874\"><tr data-start=\"3565\" data-end=\"3637\"><td data-start=\"3565\" data-end=\"3591\" data-col-size=\"sm\">Free SSL Certificates<\/td><td data-start=\"3591\" data-end=\"3604\" data-col-size=\"sm\">\u2705 Yes<\/td><td data-start=\"3604\" data-end=\"3616\" data-col-size=\"sm\">\u2705 Yes<\/td><td data-start=\"3616\" data-end=\"3629\" data-col-size=\"sm\">\u274c Limited<\/td><td data-start=\"3629\" data-end=\"3637\" data-col-size=\"sm\">\u2705 Yes<\/td><\/tr><tr data-start=\"3638\" data-end=\"3710\"><td data-start=\"3638\" data-end=\"3664\" data-col-size=\"sm\">Advanced web firewall<\/td><td data-start=\"3664\" data-end=\"3677\" data-col-size=\"sm\">\u2705 Included<\/td><td data-start=\"3677\" data-end=\"3689\" data-col-size=\"sm\">\u274c No<\/td><td data-start=\"3689\" data-end=\"3702\" data-col-size=\"sm\">\u2705 Optional<\/td><td data-start=\"3702\" data-end=\"3710\" data-col-size=\"sm\">\u274c No<\/td><\/tr><tr data-start=\"3711\" data-end=\"3803\"><td data-start=\"3711\" data-end=\"3737\" data-col-size=\"sm\">24\/7 local support<\/td><td data-start=\"3737\" data-end=\"3750\" data-col-size=\"sm\">\u2705 Yes<\/td><td data-start=\"3750\" data-end=\"3773\" data-col-size=\"sm\">\u274c No (international)<\/td><td data-start=\"3773\" data-end=\"3789\" data-col-size=\"sm\">\u2705 Yes (global)<\/td><td data-start=\"3789\" data-end=\"3803\" data-col-size=\"sm\">\u274c Limited<\/td><\/tr><tr data-start=\"3804\" data-end=\"3874\"><td data-start=\"3804\" data-end=\"3834\" data-col-size=\"sm\">Security support<\/td><td data-start=\"3834\" data-end=\"3852\" data-col-size=\"sm\">\u2705 Customized<\/td><td data-start=\"3852\" data-end=\"3859\" data-col-size=\"sm\">\u274c No<\/td><td data-start=\"3859\" data-end=\"3866\" data-col-size=\"sm\">\u274c No<\/td><td data-start=\"3866\" data-end=\"3874\" data-col-size=\"sm\">\u274c No<\/td><\/tr><\/tbody><\/table><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ac597b elementor-widget elementor-widget-text-editor\" data-id=\"7ac597b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"4069\" data-end=\"4210\"><strong data-start=\"4069\" data-end=\"4138\">Protect your business against phishing and other digital threats.<\/strong><br data-start=\"4138\" data-end=\"4141\" \/>Get your SSL certificate <strong data-start=\"4153\" data-end=\"4186\">secure with ClickPanda<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6de462 elementor-widget elementor-widget-button\" data-id=\"a6de462\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/clickpanda.com\/es-co\/certificados-ssl?utm_source=blog&#038;utm_medium=text&#038;utm_campaign=blog&#038;utm_term=blog&#038;utm_content=inline_link\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-circle-right\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm-28.9 143.6l75.5 72.4H120c-13.3 0-24 10.7-24 24v16c0 13.3 10.7 24 24 24h182.6l-75.5 72.4c-9.7 9.3-9.9 24.8-.4 34.3l11 10.9c9.4 9.4 24.6 9.4 33.9 0L404.3 273c9.4-9.4 9.4-24.6 0-33.9L271.6 106.3c-9.4-9.4-24.6-9.4-33.9 0l-11 10.9c-9.5 9.6-9.3 25.1.4 34.4z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">\ud83d\udc49 Get your SSL certificate from ClickPanda<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-813d4ca elementor-widget elementor-widget-text-editor\" data-id=\"813d4ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"4298\" data-end=\"4313\">Conclusion<\/h2><p data-start=\"4315\" data-end=\"4564\">The <strong data-start=\"4318\" data-end=\"4338\">phishing in 2025<\/strong> represents a more sophisticated threat than ever before. From AI-powered emails to deepfakes that confuse even the most cautious, digital fraud techniques are constantly evolving.<\/p><p data-start=\"4566\" data-end=\"4750\">The key to avoid becoming a victim is in the <strong data-start=\"4610\" data-end=\"4652\">prevention and safe infrastructure<\/strong>Dual authentication, cybersecurity education and robust hosting backed by experts.<\/p><p data-start=\"4752\" data-end=\"4880\">At <strong data-start=\"4755\" data-end=\"4769\">ClickPanda<\/strong>We work to protect your business with affordable solutions, 24\/7 support and a close approach.<\/p><p data-start=\"4882\" data-end=\"4992\"><strong data-start=\"4882\" data-end=\"4990\">Don't let your business fall victim to digital fraud. With ClickPanda, your security is guaranteed.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5af880 elementor-widget elementor-widget-image\" data-id=\"d5af880\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/clickpanda.com\/certificados-ssl?utm_source=blog&#038;utm_medium=banner&#038;utm_campaign=hosting_ssd&#038;utm_term=superior&#038;utm_content=banner2\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/wordpress-blogs.s3.us-east-2.amazonaws.com\/wp-content\/uploads\/2024\/07\/05221012\/CTA-BLOG-SSL-2.gif\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Introduction Phishing remains one of the most common and effective cyberthreats worldwide. Despite advances in cybersecurity, cybercriminals have perfected their methods to deceive users and businesses, causing millions in losses and compromising sensitive information. In 2025, phishing tactics have evolved: intelligence is now being used to [...]<\/p>","protected":false},"author":2,"featured_media":11731,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-11726","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse - ClickPanda Blog<\/title>\n<meta name=\"description\" content=\"Descubre las nuevas t\u00e1cticas de phishing en 2025 y aprende c\u00f3mo proteger tu negocio con consejos pr\u00e1cticos y soluciones de seguridad digital efectivas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.clickpanda.com\/en\/security\/phishing-2025-new-tactics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse - ClickPanda Blog\" \/>\n<meta property=\"og:description\" content=\"Descubre las nuevas t\u00e1cticas de phishing en 2025 y aprende c\u00f3mo proteger tu negocio con consejos pr\u00e1cticos y soluciones de seguridad digital efectivas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.clickpanda.com\/en\/security\/phishing-2025-new-tactics\/\" \/>\n<meta property=\"og:site_name\" content=\"ClickPanda Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-16T20:55:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-19T19:33:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-16-sept-2025-15_53_58.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Carolina Mateus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carolina Mateus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/\"},\"author\":{\"name\":\"Carolina Mateus\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e\"},\"headline\":\"Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse\",\"datePublished\":\"2025-09-16T20:55:12+00:00\",\"dateModified\":\"2025-09-19T19:33:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/\"},\"wordCount\":1049,\"publisher\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-16-sept-2025-15_53_58.png\",\"articleSection\":[\"Seguridad\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/\",\"url\":\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/\",\"name\":\"Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse - ClickPanda Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-16-sept-2025-15_53_58.png\",\"datePublished\":\"2025-09-16T20:55:12+00:00\",\"dateModified\":\"2025-09-19T19:33:17+00:00\",\"description\":\"Descubre las nuevas t\u00e1cticas de phishing en 2025 y aprende c\u00f3mo proteger tu negocio con consejos pr\u00e1cticos y soluciones de seguridad digital efectivas.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#primaryimage\",\"url\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-16-sept-2025-15_53_58.png\",\"contentUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-16-sept-2025-15_53_58.png\",\"width\":1024,\"height\":1024,\"caption\":\"Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.clickpanda.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#website\",\"url\":\"https:\/\/blog.clickpanda.com\/en\/\",\"name\":\"ClickPanda Blog\",\"description\":\"Noticias y novedades del mundo digital con ClickPanda\",\"publisher\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.clickpanda.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\",\"name\":\"ClickPanda Blog\",\"url\":\"https:\/\/blog.clickpanda.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg\",\"contentUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg\",\"width\":1000,\"height\":541,\"caption\":\"ClickPanda Blog\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e\",\"name\":\"Carolina Mateus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g\",\"caption\":\"Carolina Mateus\"},\"url\":\"https:\/\/blog.clickpanda.com\/en\/author\/carolina-mateus\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse - ClickPanda Blog","description":"Descubre las nuevas t\u00e1cticas de phishing en 2025 y aprende c\u00f3mo proteger tu negocio con consejos pr\u00e1cticos y soluciones de seguridad digital efectivas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.clickpanda.com\/en\/security\/phishing-2025-new-tactics\/","og_locale":"en_US","og_type":"article","og_title":"Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse - ClickPanda Blog","og_description":"Descubre las nuevas t\u00e1cticas de phishing en 2025 y aprende c\u00f3mo proteger tu negocio con consejos pr\u00e1cticos y soluciones de seguridad digital efectivas.","og_url":"https:\/\/blog.clickpanda.com\/en\/security\/phishing-2025-new-tactics\/","og_site_name":"ClickPanda Blog","article_published_time":"2025-09-16T20:55:12+00:00","article_modified_time":"2025-09-19T19:33:17+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-16-sept-2025-15_53_58.png","type":"image\/png"}],"author":"Carolina Mateus","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Carolina Mateus","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#article","isPartOf":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/"},"author":{"name":"Carolina Mateus","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e"},"headline":"Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse","datePublished":"2025-09-16T20:55:12+00:00","dateModified":"2025-09-19T19:33:17+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/"},"wordCount":1049,"publisher":{"@id":"https:\/\/blog.clickpanda.com\/en\/#organization"},"image":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-16-sept-2025-15_53_58.png","articleSection":["Seguridad"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/","url":"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/","name":"Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse - ClickPanda Blog","isPartOf":{"@id":"https:\/\/blog.clickpanda.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#primaryimage"},"image":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-16-sept-2025-15_53_58.png","datePublished":"2025-09-16T20:55:12+00:00","dateModified":"2025-09-19T19:33:17+00:00","description":"Descubre las nuevas t\u00e1cticas de phishing en 2025 y aprende c\u00f3mo proteger tu negocio con consejos pr\u00e1cticos y soluciones de seguridad digital efectivas.","breadcrumb":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#primaryimage","url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-16-sept-2025-15_53_58.png","contentUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-16-sept-2025-15_53_58.png","width":1024,"height":1024,"caption":"Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.clickpanda.com\/seguridad\/phishing-2025-nuevas-tacticas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.clickpanda.com\/"},{"@type":"ListItem","position":2,"name":"Phishing 2025: Nuevas t\u00e1cticas y c\u00f3mo protegerse"}]},{"@type":"WebSite","@id":"https:\/\/blog.clickpanda.com\/en\/#website","url":"https:\/\/blog.clickpanda.com\/en\/","name":"ClickPanda Blog","description":"Noticias y novedades del mundo digital con ClickPanda","publisher":{"@id":"https:\/\/blog.clickpanda.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.clickpanda.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.clickpanda.com\/en\/#organization","name":"ClickPanda Blog","url":"https:\/\/blog.clickpanda.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg","contentUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg","width":1000,"height":541,"caption":"ClickPanda Blog"},"image":{"@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e","name":"Carolina Mateus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g","caption":"Carolina Mateus"},"url":"https:\/\/blog.clickpanda.com\/en\/author\/carolina-mateus\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/11726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/comments?post=11726"}],"version-history":[{"count":11,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/11726\/revisions"}],"predecessor-version":[{"id":11800,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/11726\/revisions\/11800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/media\/11731"}],"wp:attachment":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/media?parent=11726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/categories?post=11726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/tags?post=11726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}