Whether a cyberattack uses ransomware, Distributed Denial of Service (DDoS), credential stuffing, or any other tactic, around a third of all successful cyber incidents involves the use of phishing techniques. And Perimeter 81’s position within the cybersecurity industry acts as a spotlight for malicious actors.