Quishing and the Resurgence of BYOD Cyber-Attack Exposure
- Date:January 29, 2026
- Author(s):
- Tracy (Kitten) Goldberg
- Report Details: 5 pages, 1 graphics
- Research Topic(s):
- Fraud & Security
- Cybersecurity
- PAID CONTENT
Overview
North Korean attackers’ latest efforts to target foreign policy experts via quishing expose long-standing bring-your-own-device vulnerabilities that U.S. organizations have failed to address. Socially engineered attacks will continually bypass identity verification and network perimeter security measures if personal mobile devices remain in the workflow. As with any mitigation strategy against social engineering attacks, quishing must be stopped at the entry point so that the QR codes used to spread malware and malicious URLs never reach employees in the first place.
×
Book a Meeting with the Author
Related content
Data Transparency in the Age of Cyber and Privacy Risk
As open banking and new privacy regulations accelerate, financial institutions face rising pressure to enhance privacy and cybersecurity transparency to strengthen consumer trust. ...
Crypto Investment Scams: How Banks Can Disrupt These Criminal Operations
Cryptocurrency investment scams have evolved into organized, global operations that are stealing billions of dollars from consumers. Recent enforcement actions and platform disrupt...
Foolproof Payments: How AI is Revolutionizing Payment Fraud
Payment fraud is becoming harder to detect as transactions move faster and fraud tactics evolve. Fraud teams are being pushed to make quick decisions with limited context, leading ...
Make informed decisions in a digital financial world