Security Awareness Training Blog

Social Engineering Blog

Latest social engineering news, analysis, tactics the bad guys are using and what you can do to defend your organization.

Teach Two Things to Decrease Phishing Attack Success

We know everyone is busy. Everyone already has too much on their plate and is trying to learn as much as they can every day.
Continue Reading

Vishing is a Rising Threat to the Enterprise

Most of us are all too familiar with vishing, the scam voice calls that offer to erase your credit card debt, to extend your automobile warranty, to get you to donate to that worthy cause ...
Continue Reading

Piggybacking: Social Engineering for Physical Access

Tailgating or piggybacking is an old but effective social engineering technique to gain physical access to restricted areas, according to Rahul Awati at TechTarget. Tailgating is when a ...
Continue Reading

Social Engineering for Espionage and Influence

Microsoft has disrupted operations carried out by a Russian government-aligned threat actor tracked as “SEABORGIUM.” The threat actor uses phishing and credential harvesting to conduct ...
Continue Reading

Massive Network of Over 10,000 Fake Investment Sites Targets Europe

Using a mix of compromised social media accounts, social engineering, call center agents, and some convincing websites, this latest scam seeks to get victims to repeatedly “invest”.
Continue Reading

New Research Shows Social Engineering and Phishing are the Top Threats

According to the CS Hub Mid-Year Market Report 2022, new findings shows that 75% of survey respondents believe that social engineering and phishing attacks are the top threat vector to ...
Continue Reading

Twilio hacked by phishing campaign targeting internet companies

Communications giant Twilio has confirmed hackers accessed customer data after successfully tricking employees into handing over their corporate login credentials.
Continue Reading

Cybercriminals Go to College with New Phishing Attacks

The summer is winding up, and the traditional academic year is approaching. And amid the welcomes from the deans of students, the activities coordinators, the academic advisors and so on, ...
Continue Reading

Labor Market Social Engineering: Supply-Side and Demand-Side

We’re accustomed to social engineering being used for credential theft and business email compromise. We’re also accustomed to hearing about the increase in remote work during the ...
Continue Reading

A Widespread, Multistage Investment Scam

A complex and ambitious investment scam has used more than 10,000 domains to induce speculators to give up not just funds, but personal information as well. Researchers at security firm ...
Continue Reading

Phishing-Based Data Breaches Take 295 Days to Contain and Breach Costs Soar to $4.91 Million

Fresh data on data breach costs from IBM show phishing, business email compromise, and stolen credentials take the longest to identify and contain.
Continue Reading

Beware of Sophisticated Malicious USB Keys

Malicious USB keys have always been a problem. There is almost no professional penetration testing team that does not drop a handful of USB keys outside of any targeted organization and ...
Continue Reading

Spear Phishing Campaign Targets Facebook Business Accounts

Researchers at WithSecure have discovered a spear phishing campaign targeting employees who have access to Facebook Business accounts. The attackers are targeting specific employees, and ...
Continue Reading

Nearly Half of Organizations Have Experienced Vishing

Forty-seven percent of organizations have experienced voice phishing (vishing) attacks over the past year, according to researchers at Mutare. Additionally, the researchers found that ...
Continue Reading

[Heads Up] Huge Losses Caused By Epidemic of ‘Pig Butchering’ Scams

Investigative reporter Brian Krebs reported today that U.S. state and federal investigators are being inundated with reports from people who’ve lost hundreds of thousands or millions of ...
Continue Reading

FBI Warns of Phony Cryptocurrency Investment Apps

Cryptocurrency investors have lost nearly $43 million to fraudulent cryptocurrency investment apps, according to the US Federal Bureau of Investigation (FBI).
Continue Reading

New Phishing Attacks Shame, Scare Victims into Surrendering Twitter, Discord Credentials

A new wave of social media phishing attacks are now using scare tactics to lure victims into sending their logins.
Continue Reading

Phishing Attacks are the Most Prevalent Source of Identity-Related Breaches

Cybercriminals almost always need to leverage credentials as part of just about any kind of cyberattack. To no surprise, phishing and social engineering play a dominant role.
Continue Reading

Facebook-Themed Scam Aims to Steal Your Credentials

A creative mix of phishing emails, solid social engineering, use of Facebook Messenger, brand and site impersonation, and a sense of urgency all add up to a believable attack.
Continue Reading

Phishing Attack Steals $8 Million Worth of Cryptocurrency

Scammers stole $8 million worth of Ethereum from users of the Uniswap cryptocurrency exchange, according to Sujith Somraaj at Decrypt. Notably, the attackers relied purely on social ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews