Back

What Is Vishing? How Voice Phishing Works and How to Stop It

Vishing attacks use voice-based social engineering to bypass traditional defenses. Learn how attackers exploit urgency, trust, and AI-generated audio to trigger breaches – and what enterprises must do to stop them.

Minutes to listen:
by Dune Research Team
11 Aug 2025
9 min read
August 11, 2025

FAQs

Complete the form below to get started.

What is Vishing?
What are the most common vishing examples?
What role does AI play in vishing?
What type of call is almost always a vishing attack?
How can you recognize a vishing attack?

Explore Our Latest Insights

Stay updated ith our expert insights and tips
View all

Deepfakes, DMs, and Deception: Dune Security on Human Cyber Risk

Dune Security’s CEO and SHI’s field CISO discuss how AI, multi-channel attacks, and user risk are transforming cybersecurity and how to adapt defenses effectively.

Featured Podcasts
A glitched portrait illustrating the human vulnerability in cybersecurity and how social engineering targets users inside enterprises.

How Social Engineering Exploits Human Behavior in Enterprises

Learn how social engineering weaponizes human behavior and organizational trust, turning routine business processes into costly avenues for enterprise compromise.

Blog

Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’

A finance worker at a multinational firm was tricked into paying out $25 million to fraudsters using deepfake technology to pose as the company’s chief financial officer in a video conference call, according to Hong Kong police.

Industry News

Never Miss a Human Risk Insights

Subscribe to the Dune Risk Brief - weekly trends, threat models,
and strategies for enterprise CISOs.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.