Quishing and the Resurgence of BYOD Cyber-Attack Exposure
- Date:January 29, 2026
- Author(s):
- Tracy (Kitten) Goldberg
- Report Details: 5 pages, 1 graphics
- Research Topic(s):
- Fraud & Security
- Cybersecurity
- PAID CONTENT
Overview
North Korean attackers’ latest efforts to target foreign policy experts via quishing expose long-standing bring-your-own-device vulnerabilities that U.S. organizations have failed to address. Socially engineered attacks will continually bypass identity verification and network perimeter security measures if personal mobile devices remain in the workflow. As with any mitigation strategy against social engineering attacks, quishing must be stopped at the entry point so that the QR codes used to spread malware and malicious URLs never reach employees in the first place.
×
Book a Meeting with the Author
Related content
A Line in the Sand for First-Party Fraud: From Identity to Intent
Financial institutions are seeing rising losses from first-party fraud, yet many still struggle to detect it before the damage is done. Traditional controls confirm who the custome...
Data Transparency in the Age of Cyber and Privacy Risk
As open banking and new privacy regulations accelerate, financial institutions face rising pressure to enhance privacy and cybersecurity transparency to strengthen consumer trust. ...
Crypto Investment Scams: How Banks Can Disrupt These Criminal Operations
Cryptocurrency investment scams have evolved into organized, global operations that are stealing billions of dollars from consumers. Recent enforcement actions and platform disrupt...
Make informed decisions in a digital financial world