The training was right — for 2019
For years, security awareness training taught the same checklist: look for typos, awkward grammar, generic greetings, and suspicious sender domains. Those signals worked because the attackers were not native speakers and were sending the same email to millions of people.
That whole model just broke.
What changed
Large language models give every attacker:
- Native-quality writing in any language, including idioms and tone matching.
- Personalization at scale. A scraped LinkedIn profile plus 30 seconds of LLM inference produces an email that references your job title, your last project, your manager's name, and a context-appropriate ask.
- Multi-stage conversations. Modern phishing is no longer one email. It is a thread that responds to your replies and adapts.
What an AI phishing attack looks like now
A typical 2026 spear phishing attempt against a finance manager might unfold like this:
- Monday: a polite, well-written email from 'HR' about updating direct deposit details. The link goes to a near-perfect clone of your payroll login.
- Tuesday: a Slack message from a spoofed coworker account asking if you saw the HR email. Builds social proof.
- Wednesday: a follow-up email from 'HR' saying they noticed you have not yet completed the update and that it must be done before payroll runs Friday.
No typo. No urgency that screams scam. Just three nudges from sources that look right.
The new defensive checklist
The signals you should train on now:
- Unexpected actions, not unexpected senders. The question is no longer 'is this sender legit?' but 'is this action something I would normally do in this channel?'
- Out-of-band verification for anything that touches money, credentials, or access. If the request involves payroll, banking, MFA, or admin permissions — confirm via a different channel.
- Slow down on Friday afternoons. Attackers know when your team is least careful.
What CISOs are doing
Forward-leaning security teams are now training staff with their own LLM-generated phishing tests — internal red teams using the same tools attackers use, so the awareness training matches what employees will actually see. If your phishing simulations still have 'Dear Sir/Madam' in them, your defense is out of date.