Social Engineering

Social Engineering Resources

Social Engineering

Latest Social Engineering Resources

Understanding Pretexting: Techniques, Examples, and Prevention
Mar 27, 2025 Sprocket Security

Understanding Pretexting: Techniques, Examples, and Prevention

Pretexting is a social engineering attack where the attacker fabricates a scenario (or pretext) to manipulate the target into divulging personal information.
Social Engineering: 9 Attack Techniques and 6 Defensive Measures
Dec 11, 2024 Sprocket Security

Social Engineering: 9 Attack Techniques and 6 Defensive Measures

Social engineering is a method used to manipulate people into divulging confidential information, enabling unauthorized access, or deploying malware.
Social Engineering Attacks: Techniques, Prominent Examples, and Prevention
Oct 18, 2024 Sprocket Security

Social Engineering Attacks: Techniques, Prominent Examples, and Prevention

Social engineering is a tactic used by attackers to manipulate individuals into revealing sensitive information or performing actions that compromise security. By exploiting human psychology, such as trust and urgency, rather than system vulnerabilities, social engineers can bypass traditional security measures. Recognizing these deceptive tactics and raising awareness is crucial to prevent data breaches and other damaging outcomes.
Social Engineering Penetration Testing: A Practical Guide
Sep 27, 2024 Sprocket Security

Social Engineering Penetration Testing: A Practical Guide

Social engineering penetration testing evaluates how susceptible an organization is to deception-based attacks targeting human vulnerabilities rather than technical systems. By simulating real-world social engineering tactics like phishing, pretexting, and physical infiltration, it assesses how well employees can detect and respond to such threats. This testing highlights the need for improved security training and protocols to protect sensitive information from...
2023 Ransomware Examples
Sep 12, 2023 Sprocket Security

2023 Ransomware Examples

Ransomware has emerged as one of the most common and damaging malware threats in recent years. In fact, the volume and expense of ransomware attacks have caused some insurers to exclude them from cybersecurity coverage. Read on to learn more about the top 2023 ransomware attacks and how to protect yourself and your company.
Never Stop Frontin’: Redirector and Proxy Setup Made Easy
Sep 09, 2021 Nicholas Anastasi

Never Stop Frontin’: Redirector and Proxy Setup Made Easy

Protecting your infrastructure from prying eyes is an important part of landing a phish and maintaining access to a client’s network. The process of setting up redirectors and reverse proxies has traditionally been difficult and hard to automate across different cloud platforms. Today, we’re going to solve that problem with our new repository, sneaky_proxy, which will allow you to automate your...
1 2 »