Podcast

Combining Social Engineering Attacks in a Cyber Kill Chain

How adversaries use social engineering and top ways your company can ward off attacks


Combining Social Engineering Attacks in a Cyber Kill Chain


Episode 3: Combining Social Engineering Attacks in a Cyber Kill Chain
Date: June 10, 2022
Guest: Dr. Eric Cole and Ben Jacob
Total Playtime: 25:48


What We'll Cover

  • Social engineering techniques and lifecycles—and how your company can mitigate these risks
  • How phishing, vishing, and spear-phishing impact industries from a social engineering standpoint
  • Value of XDR in detecting suspicious user behaviour

When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique because they rely on human error instead of software or operating system vulnerabilities. This is because as technological defenses become more robust, cybercriminals are increasingly targeting the weakest link in the chain: people. And as cybercriminals use a variety of online and offline tactics, unsuspecting users may be conned into compromising their security, releasing sensitive information, or even transferring money.

In the third episode of this three-part podcast with EM360, Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting, and Ben Jacob, Technical Lead within the Secureworks Adversary Group, walk through various social engineering scenarios used during attack simulations.