Back

What Is Vishing? How Voice Phishing Works and How to Stop It

Vishing attacks use voice-based social engineering to bypass traditional defenses. Learn how attackers exploit urgency, trust, and AI-generated audio to trigger breaches – and what enterprises must do to stop them.

Minutes to listen:
by Dune Research Team
11 Aug 2025
9 min read
August 11, 2025

FAQs

Complete the form below to get started.

What is Vishing?
What are the most common vishing examples?
What role does AI play in vishing?
What type of call is almost always a vishing attack?
How can you recognize a vishing attack?

Explore Our Latest Insights

Stay updated ith our expert insights and tips
View all
Graphic announcing a new partnership between Dune Security and Abstract Security. The image features both company logos on a dark background with a green gradient and subtle geometric patterns.

Dune Security and Abstract Security Partner to Deliver Real-Time Detection and Automated Risk Reduction

Modern attacks often reveal themselves through subtle technical events that most tools miss until it is too late. Dune Security and Abstract Security now bring real-time detection and automated risk remediation into a single defense strategy.

Blog

How a deepfake of Marco Rubio exposed the alarming ease of AI voice scams

An audio deepfake impersonating Secretary of State Marco Rubio contacted foreign ministers, a U.S. governor, and a member of Congress with AI-generated voicemails mimicking his voice, according to a senior U.S. official and a State Department cable dated July 3.

Industry News

Transforming Cybersecurity Awareness Training

Dune Security CTO Michael Waite joins Security by Default to break down how AI-boosted social engineering and identity-based deception are transforming enterprise user risk.

Featured Podcasts

Never Miss a Human Risk Insights

Subscribe to the Dune Risk Brief - weekly trends, threat models,
and strategies for enterprise CISOs.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.