Quishing is short for "QR phishing." It's the same idea as a phishing link, but the link is hidden inside a QR code so you can't see where it's actually going. Attackers use this trick because URL scanners in email don't read images, and because we're all trained to scan QR codes without thinking.
Quishing attacks we've seen recently
A sticker pasted over a real QR on a parking meter or restaurant table, sending you to a fake payment page. Phishing emails with the URL hidden inside an attached PNG so the email gateway can't scan it — you open it on your phone and land on a fake Microsoft 365 login. Lookalike domains like qrd3x.io instead of qrdex.io. QR codes that encode a bit.ly link, which then bounces through three more redirects before landing somewhere malicious.
How to protect yourself
Treat an unsolicited QR like an unsolicited link: pause. Use a scanner that previews the URL before opening it. Never enter a password or payment on a page you only got to from a QR scan — if you actually need to log in, open a fresh tab and type the real URL. And if a QR in a public place looks pasted on, try peeling it. There's usually a legitimate one underneath.