Tag

Social Engineering

Learn how attackers use psychological manipulation to trick people into revealing sensitive information or performing unsafe actions. Topics include pretexting, baiting, tailgating, vishing, and real-world social engineering case studies that expose common human vulnerabilities.

posts

Smishing Attacks

Smishing Attack Examples: Real Texts That Steal Data

In February 2021, the FBI warned that threat actors were sending fake text messages impersonating banks, delivery companies, and even state unemployment agencies — all designed to steal credentials and drain accounts. These weren't theoretical risks. The FBI's Internet Crime Complaint Center (IC3) reported over $54 million

Carl B. Johnson Apr 14, 2021 7 min read
Vishing Scam Awareness

Vishing Scam Awareness: Stop Voice Phishing Attacks

In January 2021, the FBI and CISA issued a joint advisory warning about a surge in vishing attacks targeting corporate employees working from home. Threat actors were calling employees directly, impersonating IT help desks, and convincing them to hand over VPN credentials. Within hours, attackers had access to internal networks,

Carl B. Johnson Apr 14, 2021 7 min read
Social Engineering Examples

Social Engineering Examples: Real Attacks That Worked

In July 2020, a 17-year-old from Florida convinced Twitter employees to hand over internal credentials. Within hours, the accounts of Barack Obama, Elon Musk, Joe Biden, and Apple were all posting Bitcoin scam messages. The attacker didn't exploit a software vulnerability. He exploited people. These social engineering examples

Carl B. Johnson Apr 12, 2021 6 min read
Social Engineering

How to Spot Social Engineering Before It Costs You

In July 2020, a teenager convinced Twitter employees to hand over internal credentials through a phone-based social engineering attack. The result: hijacked accounts belonging to Barack Obama, Elon Musk, Joe Biden, and Apple — broadcasting a Bitcoin scam to hundreds of millions of followers. The attacker didn't exploit a

Carl B. Johnson Apr 12, 2021 7 min read
Pretexting Attacks

Pretexting Attack Examples: Real Scams That Bypass Security

In 2020, a teenager and two accomplices convinced a Twitter employee they were from the company's IT department. That single phone call gave them access to internal tools, which they used to hijack 130 high-profile accounts — including those of Barack Obama, Elon Musk, and Apple — netting over $100,

Carl B. Johnson Apr 12, 2021 7 min read
Cybersecurity Awareness Training

Cybersecurity Awareness Training: What Actually Works

In March 2021, a single employee at a water treatment plant in Oldsmar, Florida, watched someone remotely take control of their screen and attempt to increase sodium hydroxide levels to dangerous concentrations. The attacker got in through a shared TeamViewer password. No advanced exploit. No zero-day. Just poor cybersecurity awareness

Carl B. Johnson Apr 12, 2021 6 min read
Employee Cybersecurity Training

Employee Cybersecurity Training: What Actually Works

In December 2020, FireEye disclosed one of the most sophisticated supply chain attacks in history — the SolarWinds breach. Threat actors compromised a trusted software update, slipping past automated defenses at over 18,000 organizations including multiple U.S. government agencies. But here's the detail that gets buried: investigators

Carl B. Johnson Apr 02, 2021 7 min read
Cybersecurity Best Practices

Cybersecurity Best Practices for Employees: A 2021 Guide

The Click That Cost One Company $46 Million In 2020, Ubiquiti Networks disclosed a breach that started with a single employee's compromised credentials. Attackers impersonated company executives, manipulated employees through social engineering, and walked away with $46.7 million in fraudulent wire transfers. The technology was fine. The

Carl B. Johnson Apr 02, 2021 8 min read