Cybersecurity
Penetration Testing
Vulnerability Assessment
Social Engineering
Incident Response
Forensics
Information Security
Business Continuity Management
CISO as a Service
General Data Protection Regulation
Incident Response Readiness
Information Security Health Check
ISO 27000
Risk Analysis
Gadgets
Hackstick
Hackbox
Insights
Darknet & Deepweb
Malware Analysis
Vuntie Labs
About
Our Story
Ethics & Legal
Collaboration
Let's Talk!
>
Social Engineering
Even though security measures' effectiveness to protect sensitive information increases, humans have a natural tendency to trust other people. Social engineering attacks target this weakness by using various manipulation techniques to gain access to sensitive information. The decrease in personal interaction, combined with many communication tools, creates new attack vectors for social engineering attacks. Phishing emails, CEO frauds, pretexting calls, and physical intrusions are on the rise and continuously in the news. Combined with zero-day-exploits, they become a dangerous weapon that is often used by advanced persistent threat actors.