Back

What Is Vishing? How Voice Phishing Works and How to Stop It

Vishing attacks use voice-based social engineering to bypass traditional defenses. Learn how attackers exploit urgency, trust, and AI-generated audio to trigger breaches – and what enterprises must do to stop them.

Minutes to listen:
by Dune Research Team
11 Aug 2025
9 min read
August 11, 2025

FAQs

Complete the form below to get started.

What is Vishing?
What are the most common vishing examples?
What role does AI play in vishing?
What type of call is almost always a vishing attack?
How can you recognize a vishing attack?

Explore Our Latest Insights

Stay updated ith our expert insights and tips
View all

How a deepfake of Marco Rubio exposed the alarming ease of AI voice scams

An audio deepfake impersonating Secretary of State Marco Rubio contacted foreign ministers, a U.S. governor, and a member of Congress with AI-generated voicemails mimicking his voice, according to a senior U.S. official and a State Department cable dated July 3.

Industry News

Transforming Cybersecurity Awareness Training

Dune Security CTO Michael Waite joins Security by Default to break down how AI-boosted social engineering and identity-based deception are transforming enterprise user risk.

Featured Podcasts

Five Cybersecurity Myths Enterprises Must Leave Behind in 2025

This year’s threat patterns exposed five major misconceptions about user risk that every enterprise should retire before 2026.

Blog

Never Miss a Human Risk Insights

Subscribe to the Dune Risk Brief - weekly trends, threat models,
and strategies for enterprise CISOs.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.