For end users, there is a lesson to be learned. Threat actors are using the written word, the power of language, social engineering and blended attack vectors (messages and postal mail) to dupe unsuspecting individuals for their financial benefit. Phishing attacks can occur anywhere you are reading text and observing a message.