Tag

Social Engineering

Learn how attackers use psychological manipulation to trick people into revealing sensitive information or performing unsafe actions. Topics include pretexting, baiting, tailgating, vishing, and real-world social engineering case studies that expose common human vulnerabilities.

posts

Phishing Attack

Phishing Attack Anatomy: How Breaches Actually Start

In May 2021, a single phishing attack against Colonial Pipeline's legacy VPN account triggered the largest fuel supply disruption in U.S. history. One compromised credential. No multi-factor authentication. Five days of chaos across the Eastern Seaboard. That's what a phishing attack looks like when it

Carl B. Johnson Jul 13, 2021 7 min read
Phishing News

Phishing News: The Attacks Dominating 2021 So Far

2021's Phishing Landscape Is Unlike Anything We've Seen Before In March, Microsoft reported that a massive phishing campaign had targeted over 10,000 organizations since January 2021, using sophisticated OAuth token theft to bypass multi-factor authentication. That single campaign should have been a wake-up call. Instead,

Carl B. Johnson Jul 13, 2021 7 min read
Phishing Scams

Phishing Scams: What's Actually Working in 2021

The FBI's Internet Crime Complaint Center reported $4.2 billion in losses from cybercrime in 2020 — and phishing scams were the number one reported attack type, with 241,342 complaints. That's not a typo. Nearly a quarter of a million people filed formal complaints about phishing

Carl B. Johnson Jul 13, 2021 7 min read
Is It Legit

Removed App: Is It Legit or a Security Risk?

When "Removed" Shows Up, Your Instincts Are Right to Question It Last month, I received three separate emails from readers asking the same question: they'd encountered an app, service, or website branded as "Removed" and wanted to know — removed is it legit? The fact

Carl B. Johnson Jul 13, 2021 7 min read
Spear Phishing

What Is Spear Phishing? The Targeted Attack Behind Major Breaches

In December 2020, the world learned that SolarWinds — a company whose software sat inside thousands of government and corporate networks — had been compromised by a sophisticated nation-state threat actor. The initial intrusion vector? Targeted, carefully crafted communications designed to exploit trust. If you're asking what is spear phishing,

Carl B. Johnson Jul 01, 2021 8 min read
Phishing

Define Phishing: What It Really Looks Like in 2021

In March 2021, a single phishing email led to the compromise of over 30,000 U.S. organizations through the Microsoft Exchange Server vulnerabilities. The attackers didn't need a sophisticated zero-day to get their initial foothold — they needed someone to click. If you're trying to define

Carl B. Johnson Jul 01, 2021 7 min read
Fake Mailer

Fake Mailer Attacks: How Threat Actors Spoof Emails

In March 2021, the FBI's Internet Crime Complaint Center reported that business email compromise — often launched using a fake mailer or spoofing tool — cost American organizations over $1.8 billion in 2020 alone. That made it the most financially damaging cybercrime category in the entire IC3 report, dwarfing

Carl B. Johnson Jul 01, 2021 7 min read
Cyber Security

Cyber Security in 2021: What Actually Stops Breaches

Colonial Pipeline. JBS Foods. SolarWinds. The first half of 2021 has delivered a masterclass in what happens when cyber security fails at scale. Colonial paid $4.4 million in ransom. JBS paid $11 million. And the SolarWinds fallout — which compromised nine federal agencies and over 100 private companies — is still

Carl B. Johnson Jul 01, 2021 7 min read
Security of Cyberspace

Security of Cyberspace: What Actually Works in 2021

The Colonial Pipeline ransomware attack in May 2021 shut down fuel delivery across the U.S. East Coast for nearly a week. Gas stations ran dry. Panic buying erupted. A single compromised password — reportedly linked to an inactive VPN account without multi-factor authentication — brought critical infrastructure to its knees. If

Carl B. Johnson Jun 03, 2021 6 min read
Cybersecurity Definition

Cybersecurity Definition: What It Really Means in 2021

Colonial Pipeline just paid a $4.4 million ransom to get its systems back online, shutting down fuel delivery across the U.S. East Coast for nearly a week. If you searched for a cybersecurity definition expecting a clean, academic sentence, this incident should tell you everything textbooks leave out.

Carl B. Johnson May 18, 2021 6 min read