Cyber attackers have continued to adapt their phishing methods to the changing technological and social landscape.