QR code phishing has become one of the most rapidly growing forms of phishing, especially since QR codes gained popularity during the global pandemic. Recently, INKY has observed a new evolution of this tactic, where QR codes are constructed using HTML tables and ASCII characters. We’ve noticed this technique emerging over the past few months and have implemented protections against it. Now, we’d like to share how it works and how we defend against it.
Recent Posts
- What Makes Southeast Asia the “Ground Zero of Cybercrime”?
- Is your Human Risk Management Program Creating Measurable Change? Find Out with Our Free Program Maturity Assessment
- INKY Banners Just Got Smarter: Introducing Quick Links for Instant Feedback
- CyberheistNews Vol 15 #26 [My Clicking Time Bomb] What Do I Do About the Repeat Clickers?
- Your KnowBe4 Compliance Plus Fresh Content Updates from June 2025
Recent Comments