{"id":34171,"date":"2025-06-25T16:05:57","date_gmt":"2025-06-25T20:05:57","guid":{"rendered":"https:\/\/www.rsa.com\/?p=34171"},"modified":"2025-11-14T12:00:22","modified_gmt":"2025-11-14T17:00:22","slug":"credential-phishing-what-it-is-and-how-to-prevent-it","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/","title":{"rendered":"Hame\u00e7onnage d'informations d'identification : ce que c'est et comment l'\u00e9viter"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":34172,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-34171","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-passwordless"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Credential Phishing Explained: Tactics, Prevention and How RSA Protects<\/title>\n<meta name=\"description\" content=\"Discover what credential phishing is, how it works, and which tactics attackers use. Learn how to prevent phishing with passkeys, MFA, and advanced cybersecurity solutions from RSA.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Credential Phishing: What It Is and How to Prevent It\" \/>\n<meta property=\"og:description\" content=\"Discover what credential phishing is, how it works, which tactics attackers use, and how to stop credential phishing with RSA.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-25T20:05:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-14T17:00:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-social.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ben Lebeaux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Credential Phishing: What It Is and How to Prevent It\" \/>\n<meta name=\"twitter:description\" content=\"Discover what credential phishing is, how it works, which tactics attackers use, and how to stop credential phishing with RSA.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-social.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@bcomroe@logical-inc.com\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/\"},\"author\":{\"name\":\"Ben Lebeaux\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\"},\"headline\":\"Credential Phishing: What It Is and How to Prevent It\",\"datePublished\":\"2025-06-25T20:05:57+00:00\",\"dateModified\":\"2025-11-14T17:00:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/\"},\"wordCount\":10,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-blog.webp\",\"articleSection\":[\"Passwordless\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/\",\"name\":\"Credential Phishing Explained: Tactics, Prevention and How RSA Protects\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-blog.webp\",\"datePublished\":\"2025-06-25T20:05:57+00:00\",\"dateModified\":\"2025-11-14T17:00:22+00:00\",\"description\":\"Discover what credential phishing is, how it works, and which tactics attackers use. Learn how to prevent phishing with passkeys, MFA, and advanced cybersecurity solutions from RSA.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-blog.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-blog.webp\",\"width\":1200,\"height\":741,\"caption\":\"Credential Phishing: What It Is and How to Prevent It\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/passwordless\\\/credential-phishing-what-it-is-and-how-to-prevent-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Credential Phishing: What It Is and How to Prevent It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\",\"name\":\"Ben Lebeaux\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/bcomroe@logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L'hame\u00e7onnage d'informations d'identification expliqu\u00e9 : Tactiques, pr\u00e9vention et protection par RSA","description":"D\u00e9couvrez ce qu'est l'hame\u00e7onnage d'informations d'identification, comment il fonctionne et quelles sont les tactiques utilis\u00e9es par les attaquants. Apprenez comment emp\u00eacher le phishing avec les passkeys, le MFA et les solutions de cybers\u00e9curit\u00e9 avanc\u00e9es de RSA.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/","og_locale":"fr_CA","og_type":"article","og_title":"Credential Phishing: What It Is and How to Prevent It","og_description":"Discover what credential phishing is, how it works, which tactics attackers use, and how to stop credential phishing with RSA.","og_url":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/","og_site_name":"RSA","article_published_time":"2025-06-25T20:05:57+00:00","article_modified_time":"2025-11-14T17:00:22+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-social.webp","type":"image\/webp"}],"author":"Ben Lebeaux","twitter_card":"summary_large_image","twitter_title":"Credential Phishing: What It Is and How to Prevent It","twitter_description":"Discover what credential phishing is, how it works, which tactics attackers use, and how to stop credential phishing with RSA.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-social.webp","twitter_creator":"@bcomroe@logical-inc.com","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/"},"author":{"name":"Ben Lebeaux","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9"},"headline":"Credential Phishing: What It Is and How to Prevent It","datePublished":"2025-06-25T20:05:57+00:00","dateModified":"2025-11-14T17:00:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/"},"wordCount":10,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-blog.webp","articleSection":["Passwordless"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/","url":"https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/","name":"L'hame\u00e7onnage d'informations d'identification expliqu\u00e9 : Tactiques, pr\u00e9vention et protection par RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-blog.webp","datePublished":"2025-06-25T20:05:57+00:00","dateModified":"2025-11-14T17:00:22+00:00","description":"D\u00e9couvrez ce qu'est l'hame\u00e7onnage d'informations d'identification, comment il fonctionne et quelles sont les tactiques utilis\u00e9es par les attaquants. Apprenez comment emp\u00eacher le phishing avec les passkeys, le MFA et les solutions de cybers\u00e9curit\u00e9 avanc\u00e9es de RSA.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-blog.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/credential-phishing-what-it-is-and-how-to-prevent-it-rsa-blog.webp","width":1200,"height":741,"caption":"Credential Phishing: What It Is and How to Prevent It"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/passwordless\/credential-phishing-what-it-is-and-how-to-prevent-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Credential Phishing: What It Is and How to Prevent It"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9","name":"Ben Lebeaux","sameAs":["https:\/\/x.com\/bcomroe@logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/34171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/comments?post=34171"}],"version-history":[{"count":2,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/34171\/revisions"}],"predecessor-version":[{"id":35703,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/34171\/revisions\/35703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media\/34172"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media?parent=34171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/categories?post=34171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/tags?post=34171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}