Vishing: Breaking Down Social Engineering Techniques
Social-Engineer | | artificial time constraint, authority, Liking, Newsletter, reciprocity, social engineering, social engineering techniques, Social-proof, vishing
If you’ve read our past joint newsletter, you know that Curt and I (Shelby) approach vishing in a way that […] ... Read More
Amygdala Hijacking and Social Engineering
Social-Engineer | | Amygdala Hijacking and Social Engineering, emotional intelligence, emotions, General Social Engineer Blog, social engineering, What is Amygdala Hijacking, What is social engineering, what is the amygdala
Once upon a time, there was a young lady that worked as a receptionist for a prestigious hotel. She was […] ... Read More
The Social Engineering of Survivor
Social-Engineer | | ego suspension, Influence Tactics, Newsletter, rapport building techinques, Reverse Social Engineering, Social-proof, Survivor and social engineering, the social engineering of survior, vishing
Over the span of 23 years and 44 seasons, the reality television show Survivor is perhaps one of the greatest […] ... Read More
Social Media: Be Aware of What You Share
Social-Engineer | | Cybersecurity, facebook, General Social Engineer Blog, how to be safe on social media, Instagram, Privacy, security, social media, TikTok, Twitter
Two scammers are currently being prosecuted for deploying a romance scam against at least two victims, successfully stealing over £200,000. […] ... Read More
Change Resistance and Cybersecurity
Social-Engineer | | change resistance, Cybersecurity, Newsletter, social engineer, social engineering
Possibly one of the most concerning, yet common, phrases you could hear a leader say is, “if it ain’t broke […] ... Read More
Vishing and the Monarch Casino Heist: Social Engineering News
Social-Engineer | | Cybersecurity, General, Infosecurity, Monarch Casino, social engineering, social engineering news, vishing, voice phishing
Vishing attacks were prominent in Q4 2022, increasing 142% from Q3 2022 according to the February 2023 Trellix Threat report. Vishing or “voice phishing” is the act of making fraudulent phone calls to manipulate a person. Attackers will target sensitive information that can lead to a data, network, or financial ... Read More
Influence Tactics in Everyday Life: Collections
Social-Engineer | | concessions, education, establishing rapport, General Social Engineer Blog, influence tactics in everyday life, Liking, pyschology, social engineering, Social-proof
Social engineering and collections may seem like two vastly different professions. However, they share many similarities when it comes to […] ... Read More
Effective Vishing Training
What would you say is the most effective form of cyberattack? Most of us are familiar with threats such as ransomware, which usually involves phishing emails. However, there is one cyberattack vector which is a rising threat, that is vishing or voice phishing. Vishing uses the telephone to elicit information ... Read More
Communication: Using Social Engineering Techniques in Everyday Life
Social-Engineer | | communication, communication and social engineering, ego suspension, how to use social engineering in communication, Newsletter, quid pro quo, social engineering, validating others
When I first started in the social engineering field, I had no idea how much it would impact my everyday […] ... Read More
The 2023 Security Landscape: A Social Engineer’s Take
Social-Engineer | | 2023 threat landscape, Cybersecurity, Data breaches, General, Ransomware, social engineering
High-profile data breaches, attacks on essential infrastructures, and targeted cyber warfare made 2022 a pivotal year in the cybersecurity field. It challenged an already sophisticated threat landscape. All of this has had drastic effects on organizations. It is reported that about half of CISO’s felt at risk of a cyber-attack ... Read More