I cannot concur…

It’s not realistic to ask people to *never* click a link in email. We’ve got 30+ years of experience with that advice not working because MUA developers have never stopped making links active & aggressively looking for anything in email that might be a link, regardless of URL conformance. That’s why SpamAssassin treats so many non-URLs as if they are URLs. Users will click clickable things. Telling them not to do so is unreasonable.
1/2
#InfoSec @AAKL https://infosec.exchange/@AAKL/116398057284422776

AA (@[email protected])

Never, never, never, never, never click on a link in your email. Contact the provider directly and not through the suspect email. "Approval phishing is a technique whereby victims are tricked into providing full access to their cryptocurrency wallets. Often, they are persuaded to click on a fake alert or popup spoofed to appear as if sent from a trusted app or service." Infosecurity-Magazine: Operation Atlantic Seizes $12m in Crypto Losses https://www.infosecurity-magazine.com/news/operation-atlantic-seizes-12m/ #infosec #phishing

Infosec Exchange
Instead, users need to learn to *take* *care* with their clicks. That’s a tough assignment but at least it isn’t hopeless. People can learn to do things like checking where links actually go behind the clickable text and basic sanity checking: is the person who sent that mail likely to be who they claim to be and are they sending it for plausible reasons? If you cannot instantly answer those basic questions, you need to investigate before clicking.
#InfoSec #phishing
2/2
@grumpybozo At the same time... we need to make tools expose information about links. URL Defenfe makes identifying masked links impractical for the user - and that's somewhere where URL previews are still actually shownm
@Epic_Null I’d argue that "URLDefense" is a reason to avoid ProofPoint and others who do such things like the plague.