Cambridge: 01223 209920        London: 020 3519 0124        Ireland: +353 1697 2287        Sheffield: 0114 349 8054        Suffolk: 0144 059 2163         Email: Lucy@breathetechnology.com

Beware the next generation of phishing attacks

(Watch the video summary at the end or read the full article below.)

If phishing scams are supposed to trick people, why do so many of them still feel clumsy?

For years, the answer was simple: Most scams were mass-produced.

The same email, the same fake website, sent to thousands of people, hoping a few would fall for it.

⚡️ That approach is still around, but it’s starting to evolve.

👉 When generative AI first appeared, there was a lot of talk about “dynamic websites”.

Instead of one fixed site for everyone, pages would be generated on the spot, shaped by who you are, where you are, and what device you’re using.

That future never really arrived for everyday businesses. It was complex and rarely worth the effort.

Cyber criminals, however, don’t need perfect systems.

They need something convincing.

Security researchers have shown how this idea could be used for phishing. While it’s still largely experimental, it gives a clear picture of the next generation of scams.

✳️ A victim clicks a link and lands on a webpage that looks harmless. There’s no obvious malicious code sitting on the page.

✳️ Once it loads, the page asks a legitimate AI service to help generate content.

✳️ That content is then assembled and run directly in the person’s browser.

⚠️ The result is a phishing page that’s created especially for that visitor.

⚠️ The wording, layout and code can all be different every time. There’s no single fake website for security systems to spot and block, because the scam doesn’t fully exist until someone opens it.

👉 Before you panic, this method isn’t widespread yet. Although the building blocks are in use.

AI is being used to write malicious code, malware is increasingly assembled as it runs, and AI-assisted scams are becoming more common.

For you, this changes the rules slightly.

Phishing is no longer just about spotting bad spelling or sloppy design. Future scams may look even more polished, personalised and completely legitimate.

That’s why modern protection focuses less on “don’t ever click the wrong thing” and more on limiting the damage if someone does.

✅ Tools like multi-factor authentication, secure browsers and email filtering still work, even when a fake page looks convincing.

💡 Remember this: Phishing isn’t going away. It’s getting smarter.

To stay protected now you must assume the next scam will look professional and make sure your defences don’t rely on people spotting obvious mistakes.

Want to check how exposed your organisation is? Get in touch.

☎️ Camb: 01223 209920 | London: 020 3519 0124
☎️ Suffolk: 0144 059 2163 | Sheffield: 0114 349 8054

💻 www.breathetechnology.com | 📧 lucy@breathetechnology.com

Watch our short video below:

[preloadyoutube ytid=j5HchNwQUWc]

Download the Outsourced IT Support Checklist

Every Manager responsible for IT (Finance, Office Manager, Ops etc), that's not an IT Manager by profession should review their IT Support experience. How do you know if your expectations are realistic, is the team performing, are you at risk and didn't realise? Do you have doubts? Or are they simply great,

This Check Outsourced IT Support Checklist has been created, after performing hundreds of IT Audits over more than 20 years, revealing the most commonly found problems caused by IT Support Providers.

How does yours compare? Download for free today!

(PS. Your details remain confidential and will never be shared with anyone else)