Real Experience. Real Case Studies.

Over the last three decades, I’ve watched phishing evolve from clumsy scam emails into targeted, convincing attacks that slip past filters and fool smart people on busy days. I’ve seen firms lose money, data, and trust—not because their tech failed, but because one message looked routine, urgent, or familiar. Every real incident reinforces the same lesson: phishing succeeds by exploiting human behavior, not technical gaps. These experiences shaped Phish Coach—training users to recognize real-world attacks because the threats below aren’t hypothetical. They’re the same ones I’ve dealt with in the wild.

New BlackForce Phishing Kit Enables Credential Theft via MitB Attacks and MFA Bypass

December 12 , 2025 - A widespread phishing campaign tracked as Blackforce has been actively targeting organizations by sending credential-stealing emails designed to harvest login information and gain unauthorized access to enterprise accounts.

A new wave of fake DMV phishing scams hits Utah, how to spot it

July 30, 2025 - A new wave of phishing scams in Utah is spoofing the DMV by sending fraudulent emails and texts that trick recipients into clicking malicious links and disclosing personal information.

Phishing Email Scam Impersonating Utah State Bar Communications Director

June 24, 2025 - A convincing phishing email impersonated the Utah State Bar's communications director, targeting legal professionals with a trusted sender and realistic messaging designed to prompt quick action.

FBI warns of Luna Moth extortion attacks targeting law firms

May 23, 2025 - A recent FBI alert warns that a sophisticated extortion group known as Luna Moth (Silent Ransom Group) has been using callback phishing and social engineering to trick U.S. law firm employees into granting remote access, steal sensitive data, and then extort firms by threatening to leak the information.

Real results. Real risk. Real wins.

[interface] image of a digital education platform interface
Law Firm

User phished, rule created. Mitigated in less than an hour.

December 15, 2025 - A user at one of our firms fell for a real phishing email and unknowingly allowed a malicious inbox rule to be created - one of the most common signs of account compromise. This user had completed in-person training and had seen multiple simulated phishing tests, but was still fooled by the phishing email. We were notified within minutes when the rule was created, immediately locked the account, reset the password and MFA, and removed the rule. We confirmed an unauthorized login attempt, but access was cut off before any data was moved, forwarded, or damaged. The outcome wasn’t luck - it was early detection, user awareness, and a practiced response working exactly as designed.

Ready to outsmart cyber threats?

See real results. Secure your future.