{"componentChunkName":"component---src-templates-video-js","path":"/videos/what-is-phishing/","result":{"pageContext":{"node":{"title":"What is Phishing?","path":"/videos/what-is-phishing/","slug":"what-is-phishing","categories":[{"id":"d459187f-046d-562c-9229-0f0162fe2282","name":"Videos"}],"featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/05/phishing.jpg"},"content":"<p>Most of us have probably heard about cyber adversaries using methods such as Phishing, Spear-Phishing, Whaling, Pharming, Drive by Downloads and Watering Holes creative ways to steal users credentials.</p>\n<p>These cleverly named attacks have been around for years but are still one of the most successful methods used to gain access to your network.</p>\n","excerpt":"<p>7y4vgdDFpxk</p>\n"}}}}