IREK – AESM: Institutional Repository of Economic Knowledge

Modern Methods of Detecting and Countering Phishing Attacks in the Digital Environment

Show simple item record

dc.contributor.author Haborets, Olha
dc.contributor.author Rybalchenko, Ludmila
dc.date.accessioned 2025-11-17T11:48:22Z
dc.date.available 2025-11-17T11:48:22Z
dc.date.issued 2025-05
dc.identifier.isbn 978-9975-168-48-9 (PDF)
dc.identifier.uri https://irek.ase.md:443/xmlui/handle/123456789/4696
dc.description HABORETS, Olha and Ludmila RYBALCHENKO. Modern Methods of Detecting and Countering Phishing Attacks in the Digital Environment. Online. In: Technological Innovations in Digital Security: Proceedings of the First Edition of the International Conference, Chişinău, May 15-16, 2025. Chişinău: SEP ASEM, 2025, pp. 83-85. ISBN 978-9975-168-48-9 (PDF). Disponibil: https://doi.org/10.53486/tids2025.10 en_US
dc.description.abstract Phishing attacks have evolved into a major cybersecurity threat, leveraging advanced technologies and human vulnerabilities to achieve unauthorized access, data exfiltration, and financial exploitation. This article explores the transformation of phishing tactics, identifies the latest detection technologies including artificial intelligence and behavioral analysis, and evaluates the strategic countermeasures adopted across various digital sectors. Through a comprehensive review of modern techniques such as Natural Language Processing, threat intelligence sharing, and multi-factor authentication, the article emphasizes the importance of an adaptive and collaborative approach to phishing defense. Hackers use deception to lure users out of their account passwords and compromise personal information, creating a threat to the confidentiality of information. With phishing attacks, which are a common form of digital threats to accounts, attackers hack into accounts using hypertext links with malicious codes. The issue of phishing attacks is one of the of the most common methods of gaining access to confidential user data. With the growth of information technology comes the development of various technologies for creating phishing attacks that are related to messaging and mobile devices. Attackers often intercept and crack codes to gain access to accounts and create a cyberattack using malware. Often, fraudsters use phishing attacks to gain access to accounts and sell the data to criminals. Data breaches for large enterprises can become the basis for various cyberattacks, which can result in the loss of large amounts of money. UDC: 004.056.53; JEL: Н56, D80. en_US
dc.language.iso en en_US
dc.publisher SEP ASEM en_US
dc.subject phishing en_US
dc.subject cyber threats en_US
dc.subject artificial intelligence en_US
dc.subject behavioral biometrics en_US
dc.subject natural language processing en_US
dc.subject social engineering en_US
dc.subject threat intelligence en_US
dc.subject cybersecurity strategy en_US
dc.subject phishing detection en_US
dc.subject phishing mitigation en_US
dc.title Modern Methods of Detecting and Countering Phishing Attacks in the Digital Environment en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account