{"id":8493,"date":"2026-01-15T13:36:52","date_gmt":"2026-01-15T13:36:52","guid":{"rendered":"https:\/\/phantomslab.io\/?page_id=8493"},"modified":"2026-04-14T09:33:31","modified_gmt":"2026-04-14T09:33:31","slug":"wat-is-spear-phishing","status":"publish","type":"page","link":"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-spear-phishing\/","title":{"rendered":"Wat is spear phishing?"},"content":{"rendered":"\n<section class=\"section section none none none\" style=\"padding-top: px; padding-bottom: px\">\n    <div class=\"container\" data-aos=\"fade-up\" data-aos-duration=\"500\">\n        \n\n<h2 class=\"wp-block-heading has-text-align-left\">Definition of spear phishing<\/h2>\n\n\n\n<p>Spear phishing is a targeted form of phishing aimed at a specific person or role within an organization. Messages are tailored using personal or organizational information. Because these attacks feel relevant and credible, they are harder to detect and more likely to succeed.<\/p>\n\n\n    <\/div>\n<\/section>\n\n\n<section class=\"section section none none none\" style=\"padding-top: px; padding-bottom: px\">\n    <div class=\"container\" data-aos=\"fade-up\" data-aos-duration=\"500\">\n        \n\n<h2 class=\"wp-block-heading\">Related terms<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-cybersecurity-gedrag\/\" data-type=\"page\" data-id=\"4958\">What is cybersecurity behavior?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-cybersecuritycultuur\/\" data-type=\"page\" data-id=\"4956\">What is cybersecurity culture?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-cybersecurity-leidership\/\" data-type=\"page\" data-id=\"4954\">What is cybersecurity leadership?<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-gamified-cybersecurity-learning\/\" data-type=\"page\" data-id=\"4976\">What is gamified cybersecurity learning?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-cybersecurity-e-learning\/\" data-type=\"link\" data-id=\"https:\/\/phantomslab.io\/cybersecurity-awareness\/terminology\/what-is-cybersecurity-e-learning\/\">What is cybersecurity e-learning?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-cybersecurity-entertainment\/\" data-type=\"page\" data-id=\"4972\">What is cybersecurity entertainment?<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-zijn-deepfakes\/\" data-type=\"page\" data-id=\"4848\">What are deepfakes?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-phishing\/\" data-type=\"page\" data-id=\"4846\">What is phishing?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/wat-is-social-engineering\/\" data-type=\"page\" data-id=\"4841\">What is social engineering?<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Start with a definition. Continue with awareness.<\/h3>\n\n\n    <\/div>\n<\/section>\n\n\n\n<section class=\"content_block section none none none\" style=\"padding-top: px; padding-bottom: px\">\n\n    <div class=\"container\">\n        <div class=\"row\" data-aos=\"fade-up\" data-aos-duration=\"300\">\n            <div class=\"col-12 col-md-8\">\n                <div class=\"intro\">\n                    <h2>More about cybersecurity spear phishing in practice<\/h2>\n                <\/div>\n            <\/div>\n            <div class=\"col-12 col-md-4\">\n                <div class=\"intro\">\n                                    <\/div>\n            <\/div>\n        <\/div>\n        <div class=\"row\" data-aos=\"fade-up\" data-aos-duration=\"500\">\n\n            <div class=\"col-12\">\n                                                        <div class=\"swiper OMbblzmM\">\n                        <div class=\"swiper-wrapper\">\n                                                            <div class=\"swiper-slide\">\n\n                                                                            <a href=\"https:\/\/phantomslab.io\/cybersecurity-awareness\/spear-phishing\/\" target=\"_self\">\n                                    \n                                        <div class=\"block\">\n                                            <div class=\"image_placeholder\">\n                                                <img decoding=\"async\" src=\"https:\/\/phantomslab.io\/wp-content\/uploads\/2026\/04\/Phantom-Event-NEW.webp\" alt=\"\">\n                                            <\/div>\n                                            <div class=\"text_placeholder\">\n                                                <h3>Cybersecurity spear phishing<\/h3>\n                                                <p>Explore the impact of spear phishing training within our solutions.<\/p>\n                                                                                                    <a class=\"btn alt\" href=\"https:\/\/phantomslab.io\/cybersecurity-awareness\/spear-phishing\/\" target=\"_self\">\n                                                        Read more                                                    <\/a>\n                                                                                            <\/div>\n                                        <\/div>\n\n                                                                            <\/a>\n                                    \n                                <\/div>\n                                                            <div class=\"swiper-slide\">\n\n                                                                            <a href=\"https:\/\/phantomslab.io\/blogs\/what-is-the-best-cybersecurity-training\/\" target=\"_self\">\n                                    \n                                        <div class=\"block\">\n                                            <div class=\"image_placeholder\">\n                                                <img decoding=\"async\" src=\"https:\/\/phantomslab.io\/wp-content\/uploads\/2026\/04\/Phantom-Doelgroepen.webp\" alt=\"\">\n                                            <\/div>\n                                            <div class=\"text_placeholder\">\n                                                <h3>Blog: Best cybersecurity training<\/h3>\n                                                <p>What is the best cybersecurity training?<\/p>\n                                                                                                    <a class=\"btn alt\" href=\"https:\/\/phantomslab.io\/blogs\/what-is-the-best-cybersecurity-training\/\" target=\"_self\">\n                                                        Coming soon                                                    <\/a>\n                                                                                            <\/div>\n                                        <\/div>\n\n                                                                            <\/a>\n                                    \n                                <\/div>\n                                                            <div class=\"swiper-slide\">\n\n                                                                            <a href=\"https:\/\/phantomslab.io\/team\/dick-schouten\/\" target=\"_self\">\n                                    \n                                        <div class=\"block\">\n                                            <div class=\"image_placeholder\">\n                                                <img decoding=\"async\" src=\"https:\/\/phantomslab.io\/wp-content\/uploads\/2025\/10\/Dick.webp\" alt=\"\">\n                                            <\/div>\n                                            <div class=\"text_placeholder\">\n                                                <h3>Cybersecurity spear phishing expert<\/h3>\n                                                <p>Meet Dick Schouten, expert in cybersecurity spear phishing.<\/p>\n                                                                                                    <a class=\"btn alt\" href=\"https:\/\/phantomslab.io\/team\/dick-schouten\/\" target=\"_self\">\n                                                        Read more                                                    <\/a>\n                                                                                            <\/div>\n                                        <\/div>\n\n                                                                            <\/a>\n                                    \n                                <\/div>\n                                                    <\/div>\n                    <\/div>\n                    <div class=\"nav\" data-aos=\"fade-up\" data-aos-duration=\"600\">\n                        <div class=\"OMbblzmM-prev prev arrow\"><\/div>\n                        <div class=\"OMbblzmM-next next arrow\"><\/div>\n                    <\/div>\n                 \n            <\/div>\n\n        <\/div>\n    <\/div>\n\n    <script>\n        document.addEventListener('DOMContentLoaded', function () {\n            var name = \"OMbblzmM\";\n            var swiper = new Swiper(\".\" + name, { \n                slidesPerView: 1, \n                spaceBetween: 0,\n                loop: true,\n                navigation: {\n                    nextEl: \".\" + name + \"-next\", \n                    prevEl: \".\" + name + \"-prev\", \n                },\n                breakpoints: {\n                    768: {\n                        slidesPerView: 2,\n                        spaceBetween: 30\n                    },\n                    1024: {\n                        slidesPerView: 2,\n                        spaceBetween: 30\n                    },\n                    1366: {\n                        slidesPerView: 3,\n                        spaceBetween: 30\n                    },\n                }\n            });\n        });\n    <\/script>\n\n<\/section>\n\n\n<section class=\"section section patroon_b line_btm line_top\" style=\"padding-top: 100px; padding-bottom: 100px\">\n    <div class=\"container\" data-aos=\"fade-up\" data-aos-duration=\"500\">\n        \n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<h2 class=\"wp-block-heading has-text-align-center\">From targeted attacks to targeted awareness<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Spear phishing feels personal for a reason. See how <a href=\"\/\">Phantom\u2019sLab<\/a> prepares people to recognize tailored attacks before they succeed.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/phantomslab.io\/nl\/demo\/\">Start with a free trial<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/phantomslab.io\/nl\/cybersecurity-awareness\/terminologie\/\">Go back to Cybersecurity terminology<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\"><\/div>\n<\/div>\n\n\n    <\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":7592,"parent":8100,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-8493","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/pages\/8493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/comments?post=8493"}],"version-history":[{"count":1,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/pages\/8493\/revisions"}],"predecessor-version":[{"id":8494,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/pages\/8493\/revisions\/8494"}],"up":[{"embeddable":true,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/pages\/8100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/media\/7592"}],"wp:attachment":[{"href":"https:\/\/phantomslab.io\/nl\/wp-json\/wp\/v2\/media?parent=8493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}