Email Phishing: Attackers send emails that appear to come from trusted sources, like academic institutions or funding agencies, to trick researchers into disclosing login credentials or downloading malware. Spear Phishing: A more targeted approach where attackers gather detailed information about specific individuals or projects to create highly convincing fraudulent messages. Clone Phishing: Attackers duplicate legitimate emails and alter certain links or attachments to redirect victims to malicious websites or download harmful files.