Like any species, email attackers flourish by being highly adaptable to their environment.
Their two great strengths are an excellent understanding of their prey and an equally good understanding of how they are being hunted.
Phish Where the Fish Are
Attackers are following their prey. Wherever people spend time online, danger usually lurks nearby. Attackers are exploiting the huge popularity of file sharing sites to host malicious files. They are also impersonating top-trusted global brands in order to steal information, credentials and money.