{"id":9383,"date":"2025-03-26T11:10:07","date_gmt":"2025-03-26T17:10:07","guid":{"rendered":"https:\/\/swimlane.com\/resource\/mobile-phishing\/"},"modified":"2026-04-06T04:11:56","modified_gmt":"2026-04-06T10:11:56","slug":"mobiles-phishing","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/blog\/mobile-phishing\/","title":{"rendered":"Der Aufstieg von Mobile Phishing und wie man Mobile Phishing verhindern kann"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Illustration of phishing attack on smartphone with password prompt and security shield icon.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2025-03-26T11:10:07-06:00\">M\u00e4rz 26, 2025<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">The Rise of Mobile Phishing and How to Prevent Mobile Phishing<\/h1>\n\n\n<div class=\"bs-div bs-div-44a15e4b99450b7aaf810333a0fbaa4ff5112133 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/de\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">5 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/de\/blog\/mobile-phishing\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/de\/blog\/mobile-phishing\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20Rise%20of%20Mobile%20Phishing%20and%20How%20to%20Prevent%20Mobile%20Phishing').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fmobile-phishing%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20Rise%20of%20Mobile%20Phishing%20and%20How%20to%20Prevent%20Mobile%20Phishing&url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fmobile-phishing%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fmobile-phishing%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fmobile-phishing%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\" id=\"h-mobile-phishing-attack-techniques-amp-how-to-prevent-mishing-nbsp\">Mobile Phishing Attack Techniques &amp; How to Prevent \u201cMishing\u201d&nbsp;<\/h2>\n\n\n\n<p>The pandemic has revolutionized the way we communicate. Gone are the days when we had to get off the couch to talk with coworkers and employees. Nowadays, you just need access to a cell phone to Zoom, send emails, and schedule meetings. This convenience comes at a price, though.<\/p>\n\n\n\n<p>With over 15 billion cell phones in the world, it\u2019s no wonder that malicious actors turn to mobile devices to steal data and private information. Remote work and BYOD cultures have paved an even easier path for hackers to target enterprise employees. One of the most damaging attacks: mobile phishing or \u201cmishing\u201d.<\/p>\n\n\n\n<p>Phishing attacks have been around since the mid-1990s when they originally targeted&nbsp;emails. Today, they&#8217;re more sophisticated and becoming more prevalent on mobile devices. The high frequency at which mobile phishing attacks occur means more work for <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">security operations center (SOC) teams<\/a> to manage. Continue reading to learn more about the growing threat of mobile phishing and how to handle it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Mobile Phishing?<\/h2>\n\n\n\n<p>Mobile phishing is a type of phishing attack that uses mobile devices, such as smartphones and tablets, to deliver malicious content. Historically, phishing attacks have been conducted through email messages and web pages. However, as the internet has become increasingly mobile-friendly and people are spending more time on their phones than ever before (for example, Americans spend almost <a href=\"https:\/\/www.cnet.com\/tech\/services-and-software\/americans-spent-a-third-of-waking-hours-on-mobile-devices-in-2021-report-finds\/\" target=\"_blank\" rel=\"noopener\">4.8 hours a day on their smartphones<\/a>), cybercriminals have turned their attention to this new avenue for victimizing users.<\/p>\n\n\n\n<p>Mobile phishing attacks may be harder to detect because they extend beyond regular email phishing. SMS-based attacks (smishing), malicious voice calls (vishing), and app-based phishing have exploded in popularity \u2013 and severity. And they&#8217;re harder to defend against because they&#8217;re designed specifically for mobile devices and rely on your trust in legitimate apps you already use regularly:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><p dir=\"ltr\">SMS\/text messaging \u2013 phishing texts commonly impersonate banking apps, shipping providers, and <a href=\"https:\/\/cnycentral.com\/news\/local\/boss-scam-employees-targeted-with-texts-and-emails-during-pandmic\" target=\"_blank\" rel=\"noopener\">even your CEO<\/a>.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Voice mails \u2013 it\u2019s more than your car\u2019s extended warranty, vishing attacks will mimic the IRS, loan providers, and more.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Facebook Messenger \u2013 beware of suspicious links in messages, <a href=\"https:\/\/cybernews.com\/security\/we-uncovered-a-facebook-phishing-campaign-that-tricked-nearly-500000-users-in-two-weeks\/\" target=\"_blank\" rel=\"noopener\">even from your Facebook Friends<\/a>.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">WhatsApp \u2013 attacks can target victims <a href=\"https:\/\/faq.whatsapp.com\/1419898338168991\/?locale=en_US\">within the app<\/a> and <a href=\"https:\/\/tech.co\/news\/whatsapp-phishing-scam-steals-info\">via email<\/a>.<\/p><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-different-techniques-for-mobile-phishing-attack\"><figure><img decoding=\"async\" data-image=\"233272\" style=\"opacity: 1;\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/Types-of-Mobile-Phishing-1.gif\"><\/figure>Different Techniques for Mobile Phishing Attack<\/h2>\n\n\n\n<p>Mobile phishing strategies employ deceitful techniques to trick users on mobile devices into divulging sensitive information. The most common methods include:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">URL Padding: Cybercriminals use domains within lengthy URLs, hiding malicious sites.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Tiny URLs: Attackers use shortened links for SMS phishing (smishing) in large-scale attacks.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Screen Overlays: Phishing apps mimic mobile apps to steal user authentication credentials, especially targeting mobile banking and payment apps.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Mobile Verification: Phishing sites check the device type to deploy mobile-specific attacks.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">SMS Spoofing (OTA): Fake text messages appear as system updates, tricking users into clicking links that may intercept data.<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">These tactics exploit mobile device vulnerabilities, making users more susceptible to phishing techniques over the phone.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mishing-vs-phishing\">Mishing vs Phishing<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">The difference between mobile phishing and traditional phishing is the delivery. While traditional phishing emails are sent through email, mobile phone phishing takes advantage of the fact that many people use their phones for banking, shopping, and business. This expanded attack surface includes text messaging, phone calls, voice mails, apps, and social media platforms. While the delivery maybe be the main difference, there are other key elements to consider as well.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-rise-of-cell-phone-phishing\"><strong>The Rise of Cell Phone Phishing <\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><p dir=\"ltr\"><a href=\"https:\/\/www.proofpoint.com\/us\/blog\/security-awareness-training\/2022-state-phish-explores-increasingly-active-threat-landscape\" target=\"_blank\" rel=\"noopener\">74% of companies<\/a> faced smishing attacks last year.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">In 2021, 61% of surveyed companies dealt with social media phishing attacks.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\"><a href=\"https:\/\/purplesec.us\/resources\/cyber-security-statistics\/#MobileSecurity\" target=\"_blank\" rel=\"noopener\">51% of organizations<\/a> allow employees to access corporate applications on their personal mobile devices.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Phishing attacks on mobile devices have grown at a consistent rate of 85% annually.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">42% of organizations report that vulnerabilities in mobile devices and web applications have led to a security incident.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">75% of the phishing sites specifically targeted mobile devices.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">There are almost 75x more phishing sites than malware sites on the internet, according to <a href=\"https:\/\/transparencyreport.google.com\/safe-browsing\/overview?unsafe=dataset:1;series:malware,phishing;start:1579219200000;end:1611791999999&amp;lu=unsafe\" target=\"_blank\" rel=\"noopener\">Google Safe Browsing<\/a>.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">The Bank of Ireland was <a href=\"https:\/\/www.irishtimes.com\/business\/financial-services\/bank-of-ireland-does-u-turn-after-refusal-to-reimburse-smishing-victims-1.4326502\" target=\"_blank\" rel=\"noopener\">forced to pay out \u20ac800,000<\/a> to 300 bank customers as the result of a single smishing attack.<\/p><\/li>\n\n\n\n<li>In 2024, <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/82-phishing-target-mobile-devices\/\">80% of phishing sites <\/a>now specifically target mobile devices, showing a significant rise in mobile-focused attacks.<\/li>\n\n\n\n<li>The average cost of a successful mobile phishing attack on a business is <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">now $4.5 million<\/a>.<br><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-your-mobile-phishing-protection-checklist\">Your Mobile Phishing Protection Checklist<\/h2>\n\n\n\n<p>Mobile phishing scams happen around the clock, so make sure your defense is always ready. Here are a few areas to consider for your phishing defense and response:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><p dir=\"ltr\"><strong>Educate Employees: <\/strong>Prevention is your best defense. Ensure that mobile phishing safety is included in regular employee security training. Highlight common red flags and real-life examples so that employees know what to look out for. Establishing a security-first culture within your organization can reduce the number of successful phishing attacks.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\"><strong>Collect Evidence<\/strong>: Encourage employees to send screenshots of any malicious texts, messages, and emails from the targeted mobile device (and remind them to block the sender). If an employee falls victim to a phishing attempt, it\u2019s critical to know what the successful attack looked like.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\"><strong>Analyze Data:<\/strong> Your security team can quickly identify attack trends once enough data is collected. For instance, if you notice an uptick in smishing attacks that impersonate the CEO, that is a great opportunity to send out company-wide security alerts.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\"><strong>Have an <a href=\"https:\/\/swimlane.com\/blog\/incident-response\/\">Incident Response Plan<\/a>: <\/strong>Did an employee click a bad link or share private information? Then it\u2019s go time \u2013 activate your IR procedures. Make sure that your team has documentation of what steps to follow: anything from quarantining devices, to searching internal systems, to reviewing logs for other affected users.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\"><strong>Establish a BYOD Policy: <\/strong>Creating a <a href=\"https:\/\/www.dialpad.com\/blog\/byod-policy\/\" target=\"_blank\" rel=\"noopener\">Bring Your Own Device<\/a> policy is a necessity, whether in-office, hybrid, or remote. Include parameters around <a href=\"https:\/\/swimlane.com\/blog\/employee-onboarding-offboarding-automation\" rel=\"noopener\">employee offboarding<\/a>, device loss, theft, and device updates.<\/p><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-triage-phishing-with-modern-tools-nbsp-security-automation\">Triage Phishing with Modern Tools:&nbsp;<br>Security Automation<\/h2>\n\n\n\n<p>Mobile phishing attacks will continue to grow in frequency and sophistication. Remote work and our reliance on mobile devices will fuel these attacks even more. And with security teams receiving thousands of alerts daily, leaders are on the search for options to stay ahead of phishing threats.<\/p>\n\n\n\n<p>Security automation platforms offer solutions to combat the rise of mobile phishing attacks. <strong>Benefits of automation include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><p dir=\"ltr\">Save SOC analyst time with automatic investigation and quarantine<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Gain visibility into phishing attempts from the dashboard<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Block false positives with entirely automated workflow<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Increase efficiency with real-time case collaboration<span style=\"font-family: -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, &quot;Helvetica Neue&quot;, Arial, &quot;Noto Sans&quot;, sans-serif, &quot;Apple Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, &quot;Segoe UI Symbol&quot;, &quot;Noto Color Emoji&quot;; font-size: 1rem;\"><\/span><\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Improve security metrics, such as reducing mean time to resolve (MTTR)<\/p><\/li>\n<\/ul>\n\n\n\n<p>The purpose of adding automation is to empower SOC teams to stop more threats faster. These platforms automate the repetitive, mundane tasks that suck time away from SOC analysts.<\/p>\n\n\n\n<p>Whether you introduce security automation into your SOC or establish a manual IR process, mobile phishing needs to be on your threat radar. Educate employees, secure the growing attack surface, and have a thorough incident response process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common FAQs around Mobile Phishing<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">How to look up for mobile phishing numbers?<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">You can search for mobile phishing numbers by using online reverse phone lookup services or mobile apps designed to identify and report spam or phishing calls. These types of services can help you identify if a number has been reported for suspicious or fraudulent activity.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Can phishing be done by iPhones?<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Phishing attacks can target iPhones. Phishing attacks rely on social engineering techniques to deceive users, regardless of the device they&#8217;re using. iPhones can also receive phishing emails, text messages, or encounter phishing websites. It&#8217;s important to be cautious and follow best practices for online security.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Can phishing hack your phone?<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Phishing can lead to the compromise of your phone. Phishing attacks aim to trick users into revealing personal information or downloading malicious software. If they&#8217;re successful, these attacks can lead to data theft, unauthorized access, or control of your device.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is mishing in cyber security?&nbsp;<\/h3>\n\n\n\n<p>Mishing (mobile phishing) is a cyberattack where scammers use SMS or messaging apps to trick users into revealing sensitive information, clicking malicious links, or downloading malware.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What other types of phishing attacks can you encounter on mobile devices?<\/h3>\n\n\n\n<p>Besides mishing, mobile users may face:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Smishing<\/strong> \u2013 SMS\/text-based phishing<\/li>\n\n\n\n<li><strong>Quishing<\/strong> \u2013 QR code-based phishing<\/li>\n\n\n\n<li><strong>Vishing<\/strong> \u2013 Voice call phishing<\/li>\n\n\n\n<li><strong>App-based phishing<\/strong> \u2013 Malicious apps stealing data<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">How is mobile phishing security different from computer and laptop?<\/h3>\n\n\n\n<p>Mobile phishing exploits SMS, messaging apps, and QR codes, making it harder to detect than traditional email phishing. Mobile devices also have smaller screens and limited security tools, increasing the risk of accidental clicks on malicious links.<\/p>\n\n\n\n<div class=\"bs-div bs-div-f220fd693220b8d187cf27a170c4009a8c8fe3ce bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-f220fd693220b8d187cf27a170c4009a8c8fe3ce {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Turbine_playbook_Add-panel-filter_search-3-1.gif' class='img-fluid'   alt='Animated GIF showing Swimlane Turbine playbook interface with advanced panel filtering and automated logic search.' title='' data-gif= \"https:\/\/swimlane.com\/wp-content\/uploads\/Turbine_playbook_Add-panel-filter_search-3-1.gif\" \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-see-swimlane-turbine-in-action\">See Swimlane Turbine in Action <\/h2>\n\n\n\n<p>Schedule a Swimlane Turbine live demonstration with our experts! Learn how our AI-enabled security automation platform can help you solve the most challenging problems across your entire security organization.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-b9a65ac977059f2e5b91a2d45ad8f7b70e20d12b\"><style>.bs-pro-button-p-btn-b9a65ac977059f2e5b91a2d45ad8f7b70e20d12b .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/demo\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a Demo<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dbc0f4805fb bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/5-enterprise-mobile-device-security-threats\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Nov. 30, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>5 Threats to Your Enterprise Mobile Device Security and How to Prevent Them<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dbc0f4818b9 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/types-of-cyber-security-attacks\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Juni 3, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>10 Types of Cybersecurity Attacks &amp; How to Prevent Them<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dbc0f482a3f bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/soar-automated-phishing-investigation-and-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Sep. 26, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Don\u2019t Take the Bait: Automated Phishing Investigation and Response<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":46400,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":46401,"learn_more_label":"","image_alt_text":"Mobile Phishing Attack Techniques & How to Prevent Them","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75,76,69],"class_list":["post-9383","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-security-automation","blog-category-learn","blog-category-use-cases"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mobile Phishing Attack Techniques &amp; How to Prevent Them<\/title>\n<meta name=\"description\" content=\"Learn all about the rise of mobile phishing attacks and expert tips to safeguard your devices. Stay ahead of mobile phishing with our prevention guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/blog\/mobiles-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Rise of Mobile Phishing and How to Prevent Mobile Phishing\" \/>\n<meta property=\"og:description\" content=\"Learn all about the rise of mobile phishing attacks and expert tips to safeguard your devices. Stay ahead of mobile phishing with our prevention guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/blog\/mobiles-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T10:11:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-19.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Learn all about the rise of mobile phishing attacks and expert tips to safeguard your devices. Stay ahead of mobile phishing with our prevention guide.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-19.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7\u00a0Minuten\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Techniken von Phishing-Angriffen auf Mobilger\u00e4te und wie man sich davor sch\u00fctzen kann","description":"Erfahren Sie alles \u00fcber den Anstieg von Phishing-Angriffen auf Mobilger\u00e4te und erhalten Sie Expertentipps zum Schutz Ihrer Ger\u00e4te. Mit unserem Pr\u00e4ventionsleitfaden sind Sie mobilen Phishing-Angriffen immer einen Schritt voraus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/blog\/mobiles-phishing\/","og_locale":"de_DE","og_type":"article","og_title":"The Rise of Mobile Phishing and How to Prevent Mobile Phishing","og_description":"Learn all about the rise of mobile phishing attacks and expert tips to safeguard your devices. Stay ahead of mobile phishing with our prevention guide.","og_url":"https:\/\/swimlane.com\/de\/blog\/mobiles-phishing\/","og_site_name":"AI Security Automation","article_modified_time":"2026-04-06T10:11:56+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-19.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"Learn all about the rise of mobile phishing attacks and expert tips to safeguard your devices. Stay ahead of mobile phishing with our prevention guide.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-19.png","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"7\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/blog\/mobile-phishing\/","url":"https:\/\/swimlane.com\/de\/blog\/mobile-phishing\/","name":"Techniken von Phishing-Angriffen auf Mobilger\u00e4te und wie man sich davor sch\u00fctzen kann","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/blog\/mobile-phishing\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/blog\/mobile-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png","datePublished":"2025-03-26T17:10:07+00:00","dateModified":"2026-04-06T10:11:56+00:00","description":"Erfahren Sie alles \u00fcber den Anstieg von Phishing-Angriffen auf Mobilger\u00e4te und erhalten Sie Expertentipps zum Schutz Ihrer Ger\u00e4te. Mit unserem Pr\u00e4ventionsleitfaden sind Sie mobilen Phishing-Angriffen immer einen Schritt voraus.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/blog\/mobile-phishing\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/blog\/mobile-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/blog\/mobile-phishing\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-32.png","width":1120,"height":666,"caption":"Illustration of phishing attack on smartphone with password prompt and security shield icon."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/blog\/mobile-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The Rise of Mobile Phishing and How to Prevent Mobile Phishing"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9383\/revisions"}],"predecessor-version":[{"id":55509,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9383\/revisions\/55509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/46400"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=9383"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=9383"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=9383"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=9383"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=9383"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=9383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}