Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to

Methods of Social Engineering

What are some of the methods phishers use to compromise organizations? In this video, Nick goes over the common methods phishers use to gain information: Phishing is most insidious when it uses a combination of techniques. It can even overcome sophisticated security measures like Multifactor Authentication (MFA) – for example, if an attacker manages to steal a password through email, then calls the user pretending to be a technician asking them to approve an authenticator popup on their phone.

The Simply Cyber Report: October 31, 2022

The top cyber news stories you need to know about right now. Microsoft Security Threat Intelligence is reporting on the Raspberry Robin worm, having infected at least 3000 systems across 1000 organizations at time of this report. First reported by Red Canary in September, Raspberry Robin is spread via USB drive (yes this is still a viable attack vector, and very similar to how Stuxnet initially kicked off). It has very similar technical behavior to the FakeUpdates malvertising campaigns.

Why Security Service Edge (SSE) Architecture Matters

The architecture of any security platform has a huge impact on its ability to protect your business. This still applies when evaluating a Security Service Edge (SSE) platform. Not all SSE platforms are made equal and the proof is in the way it was architected. Learn why architecture matters when selecting a SSE solution and different factors you should be aware of.

Goals of Social Engineering

Social engineering, including phishing, is one of the best opportunities for an attacker to enter a well-secured network. Knowing what data is at risk is an important part of any security strategy. What data or systems of value does your organization have access to? That’s what an attacker will try to hijack. Sedara can help protect your organization against social engineering attacks and more. Subscribe to our YouTube Channel to learn more about protecting your organization.

What is Social Engineering?

Many organizations focus on technological controls to protect their assets. But that’s only part of the story! Smart attackers use social engineering to achieve their goals in compromising networks and data. In a social engineering attack vector, attackers lie or present deceptive fronts to convince people to divulge information or take some action that allows the attackers access. If you learned anything from this video, please subscribe to our YouTube Channel! We will be releasing more videos to help you understand cybersecurity for your organization.