Social Engineering

Social engineering attacks don’t rely on code — they rely on people. By exploiting human psychology, attackers manipulate victims into giving away information or performing risky actions. These techniques power some of the most effective and dangerous cyberattacks, from phishing and vishing to multi-channel deception campaigns. Our articles explore how social engineering works, why it’s so hard to detect, and what steps organizations can take to reduce their vulnerability.

From a CEO Impersonation, a Slack Lure to a Full-On Compromise: The Axios & UNC1069 Case

From a CEO Impersonation, a Slack Lure to a Full-On Compromise: The Axios & UNC1069 Case

The recent Axios npm supply chain attack, attributed to UNC1069 (suspected North Korean actors), was not a technical exploit. It was a meticulously crafted social engineering campaign. From a...

How to Defend Against Advanced Smishing Attacks (and Why Basic Training Isn't Enough Anymore)

How to Defend Against Advanced Smishing Attacks (and Why Basic Training Isn't Enough Anymore)

Smishing has moved well beyond a fraudulent text. From MitM OTP hijacking to cross-channel escalation, here's how sophisticated SMS-based attacks work, and what it takes to stop them.

ClickFix Attacks: How Hackers Make Your Employees Run Malware Themselves

ClickFix Attacks: How Hackers Make Your Employees Run Malware Themselves

ClickFix is one of the fastest-growing social engineering attack techniques. It needs no exploit, no malicious attachment, just a fake error message and a willing user. Here is what happened, why...

AI-Powered Social Engineering in Financial Services: What Every CISO Needs to Know in 2026

AI-Powered Social Engineering in Financial Services: What Every CISO Needs to Know in 2026

AI-powered social engineering is reshaping the threat landscape for banks, insurers, and fintechs. This guide gives financial services CISOs the frameworks, checklists, and strategic intelligence...

Figure Data Breach: Social Engineering Actors Are Preying on Fintechs, but It’s Not a Fatality

Figure Data Breach: Social Engineering Actors Are Preying on Fintechs, but It’s Not a Fatality

Blockchain lending firm Figure confirmed a significant data breach resulting from a social engineering attack on an employee, leading to the leak of customer data and highlighting the persistent...

The Le Drian Scam: A Masterclass in Social Engineering

The Le Drian Scam: A Masterclass in Social Engineering

Social engineering, the art of manipulating individuals to divulge confidential information or perform actions that compromise security, has evolved dramatically in recent years. But before...

Social Engineering Attacks: Tactics and Defenses

Social Engineering Attacks: Tactics and Defenses

In this article we’ll explore how people’s emotions become business vulnerabilities, why social engineering is so effective, and three powerful principles to secure and protect your environment.

Social Engineering Examples: Real-World Tactics

Social Engineering Examples: Real-World Tactics

How can you protect your organization from social engineering attacks and their adverse impacts? This article explores different attack strategies, real-world examples, and prevention methods.

How Do People Get Doxxed? | Risks and Prevention Tips

How Do People Get Doxxed? | Risks and Prevention Tips

Doxxing, short for “document tracing,” refers to the act of publicly disclosing someone’s personal information, like their real name, home address, phone number, or even financial data, without...

Pretexting Definition: The Art of Deceptive Information Gathering

Pretexting Definition: The Art of Deceptive Information Gathering

Pretexting is a social engineering tactic that involves creating a fabricated scenario to deceive an individual into disclosing sensitive information. Unlike other forms of cyberattacks,...

What is Pretexting? | Understanding Social Engineering

What is Pretexting? | Understanding Social Engineering

Pretexting is a sophisticated social engineering technique used by cybercriminals to manipulate individuals into divulging sensitive information. But what is pretexting exactly, and how does it...

Social Engineering Definition: Cybersecurity Best Practices

Social Engineering Definition: Cybersecurity Best Practices

Social engineering is a technique used by cybercriminals to manipulate individuals into revealing confidential information or performing actions that compromise security. Rather than hacking...