{"id":1585452,"date":"2017-08-23T13:57:44","date_gmt":"2017-08-23T19:57:44","guid":{"rendered":"http:\/\/secblvd.wpengine.com\/?page_id=1585452"},"modified":"2018-01-11T02:10:22","modified_gmt":"2018-01-11T07:10:22","slug":"social-engineering","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/social-engineering\/","title":{"rendered":"Social Engineering"},"content":{"rendered":"<div id=\"pl-1585452\"  class=\"panel-layout\" ><div id=\"pg-1585452-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1585452-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1585452-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1585452-0-0-0\" >\t\t\t<div class=\"textwidget\"><h1>Social Engineering<\/h1>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1585452-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"13528d6o2q\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037060\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw.png\" class=\"pt-cv-thumbnail img-none\" alt=\"David \u201cdwizzzle\u201d Weston\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Microsoft Veeps Ignite Fire Under CrowdStrike<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T12:03:14-05:00\">2 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037038\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/credit-card-rupixen-Q59HmzK38eQ-unsplash-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"PCI DSS, third-party, businessmman with a credit card and computer\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self cvplbd\" target=\"_self\" >Black Friday Scammers are Hard at Work: Security Experts<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T09:00:12-05:00\">2 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2034878\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canada-china-cccs-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/canada-richixbw-nic-amaya-W8EP1hOwO7E-unsplash.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Canadian \u201cmounties\u201d marching down the street\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/canada-richixbw-nic-amaya-W8EP1hOwO7E-unsplash.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/canada-richixbw-nic-amaya-W8EP1hOwO7E-unsplash-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/canada-richixbw-nic-amaya-W8EP1hOwO7E-unsplash-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canada-china-cccs-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >\u00d4! China Hacks Canada too, Says CCCS<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-01T12:44:35-04:00\">1 month ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#13528d6o2q\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#13528d6o2q\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-0f66fbfc03\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1585452-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037440\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/response-to-cisa-advisory-aa24-326a-enhancing-cyber-resilience-insights-from-cisa-red-team-assessment-of-a-us-critical-infrastructure-sector-organization\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/response-to-cisa-advisory-aa24-326a-enhancing-cyber-resilience-insights-from-cisa-red-team-assessment-of-a-us-critical-infrastructure-sector-organization\/\" class=\"_self cvplbd\" target=\"_self\" >Response to CISA Advisory (AA24-326A): Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/ayelen-torello\/\" rel=\"author\">Ayelen Torello<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T14:25:39-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/adversary-emulation\/' title='adversary emulation' class='pt-cv-tax-adversary-emulation'>adversary emulation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cisa-alert\/' title='CISA Alert' class='pt-cv-tax-cisa-alert'>CISA Alert<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/critical-infrastructure\/' title='Critical Infrastructure' class='pt-cv-tax-critical-infrastructure'>Critical Infrastructure<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-resilience\/' title='cyber resilience' class='pt-cv-tax-cyber-resilience'>cyber resilience<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity-advisory-csa\/' title='Cybersecurity Advisory (CSA)' class='pt-cv-tax-cybersecurity-advisory-csa'>Cybersecurity Advisory (CSA)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/red-team-assessment-rta\/' title='Red Team Assessment (RTA)' class='pt-cv-tax-red-team-assessment-rta'>Red Team Assessment (RTA)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/red-teaming\/' title='Red Teaming' class='pt-cv-tax-red-teaming'>Red Teaming<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">In response to the recently published CISA Advisory (AA24-326A) which highlights the CISA Red Team's simulation of real-world malicious cyber operations, AttackIQ has provided actionable recommendations to help organizations emulate these attacks ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=AttackIQ&feed_id=1032&blog_url=https:\/\/www.attackiq.com\/\">AttackIQ<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037060\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"David \u201cdwizzzle\u201d Weston\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Microsoft Veeps Ignite Fire Under CrowdStrike<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T12:03:14-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike\/' title='CrowdStrike' class='pt-cv-tax-crowdstrike'>CrowdStrike<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-falcon\/' title='CrowdStrike Falcon' class='pt-cv-tax-crowdstrike-falcon'>CrowdStrike Falcon<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-incident\/' title='CrowdStrike incident;' class='pt-cv-tax-crowdstrike-incident'>CrowdStrike incident;<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-updates\/' title='crowdstrike updates' class='pt-cv-tax-crowdstrike-updates'>crowdstrike updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/david-weston\/' title='David Weston' class='pt-cv-tax-david-weston'>David Weston<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ignite\/' title='ignite' class='pt-cv-tax-ignite'>ignite<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft\/' title='Microsoft' class='pt-cv-tax-microsoft'>Microsoft<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-security\/' title='Microsoft security' class='pt-cv-tax-microsoft-security'>Microsoft security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-virus-initiative\/' title='Microsoft Virus Initiative' class='pt-cv-tax-microsoft-virus-initiative'>Microsoft Virus Initiative<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-windows\/' title='Microsoft Windows' class='pt-cv-tax-microsoft-windows'>Microsoft Windows<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/quick-machine-recovery\/' title='Quick Machine Recovery' class='pt-cv-tax-quick-machine-recovery'>Quick Machine Recovery<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/rust\/' title='rust' class='pt-cv-tax-rust'>rust<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/safe-deployment-practices\/' title='Safe Deployment Practices' class='pt-cv-tax-safe-deployment-practices'>Safe Deployment Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/windows\/' title='Windows' class='pt-cv-tax-windows'>Windows<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/windows-security\/' title='Windows security' class='pt-cv-tax-windows-security'>Windows security<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037038\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"PCI DSS, third-party, businessmman with a credit card and computer\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/credit-card-rupixen-Q59HmzK38eQ-unsplash-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self cvplbd\" target=\"_self\" >Black Friday Scammers are Hard at Work: Security Experts<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T09:00:12-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/black-friday\/' title='black friday' class='pt-cv-tax-black-friday'>black friday<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/impersonation-attacks\/' title='Impersonation attacks' class='pt-cv-tax-impersonation-attacks'>Impersonation attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-shopping-scams\/' title='online shopping scams' class='pt-cv-tax-online-shopping-scams'>online shopping scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Scammers are using everything from fraudulent deals and fake ads to spoofed websites and brand impersonation to target online shoppers who are gearing up for Black Friday as the holiday buying season ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037337\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/social-engineering-tactics-sympathy-and-assistance-themes\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Social Engineering Tactics\" title=\"\" data-cvpsrc=\"https:\/\/www.social-engineer.org\/wp-content\/uploads\/2024\/11\/2024-November-SEORG-Blog-600-x-400-px.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/social-engineering-tactics-sympathy-and-assistance-themes\/\" class=\"_self cvplbd\" target=\"_self\" >Social Engineering Tactics: Sympathy and Assistance Themes<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/social-engineer\/\" rel=\"author\">Social-Engineer<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T09:00:22-05:00\">November 19, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/general-social-engineer-blog\/' title='General Social Engineer Blog' class='pt-cv-tax-general-social-engineer-blog'>General Social Engineer Blog<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">In today\u2019s interconnected world, bad actors use cunning psychological tactics to exploit our natural instincts. Social engineering scams frequently exploit [\u2026] ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Security Through Education&feed_id=299&blog_url=https:\/\/www.social-engineer.org\/\">Security Through Education<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036864\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/government-agency-spoofing-docusign-attacks-exploit-government-vendor-trust\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"DocuSign impersonation attacks are exploiting government-vendor theft\" title=\"\" data-cvpsrc=\"https:\/\/slashnext.com\/wp-content\/uploads\/2024\/11\/docusign_685501823-1024x683.jpeg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/government-agency-spoofing-docusign-attacks-exploit-government-vendor-trust\/\" class=\"_self cvplbd\" target=\"_self\" >Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/stephen-kowski\/\" rel=\"author\">Stephen Kowski<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-18T06:00:58-05:00\">November 18, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cto-corner\/' title='CTO Corner' class='pt-cv-tax-cto-corner'>CTO Corner<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/docusign\/' title='DocuSign' class='pt-cv-tax-docusign'>DocuSign<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/email-protection\/' title='Email Protection' class='pt-cv-tax-email-protection'>Email Protection<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fraud\/' title='Fraud' class='pt-cv-tax-fraud'>Fraud<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/government-attack\/' title='government attack' class='pt-cv-tax-government-attack'>government attack<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/impersonation\/' title='impersonation' class='pt-cv-tax-impersonation'>impersonation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/social-engineering\/' title='social engineering' class='pt-cv-tax-social-engineering'>social engineering<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/spoofing\/' title='spoofing' class='pt-cv-tax-spoofing'>spoofing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=SlashNext&feed_id=614&blog_url=https:\/\/slashnext.com\">SlashNext<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034878\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canada-china-cccs-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Canadian \u201cmounties\u201d marching down the street\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/canada-richixbw-nic-amaya-W8EP1hOwO7E-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canada-china-cccs-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >\u00d4! China Hacks Canada too, Says CCCS<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-01T12:44:35-04:00\">November 1, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/canada\/' title='canada' class='pt-cv-tax-canada'>canada<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/canadian-centre-for-cyber-security\/' title='Canadian Centre for Cyber Security' class='pt-cv-tax-canadian-centre-for-cyber-security'>Canadian Centre for Cyber Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/canadian-government\/' title='Canadian Government' class='pt-cv-tax-canadian-government'>Canadian Government<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china\/' title='china' class='pt-cv-tax-china'>china<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-linked-hackers\/' title='China-linked Hackers' class='pt-cv-tax-china-linked-hackers'>China-linked Hackers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-nexus-cyber-attacks\/' title='China-nexus cyber attacks' class='pt-cv-tax-china-nexus-cyber-attacks'>China-nexus cyber attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-nexus-cyber-espionage\/' title='China-nexus cyber espionage' class='pt-cv-tax-china-nexus-cyber-espionage'>China-nexus cyber espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese\/' title='Chinese' class='pt-cv-tax-chinese'>Chinese<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-communists\/' title='Chinese Communists' class='pt-cv-tax-chinese-communists'>Chinese Communists<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-cyber-espionage\/' title='Chinese cyber espionage' class='pt-cv-tax-chinese-cyber-espionage'>Chinese cyber espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-government\/' title='chinese government' class='pt-cv-tax-chinese-government'>chinese government<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-hacker\/' title='chinese hacker' class='pt-cv-tax-chinese-hacker'>chinese hacker<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-hackers\/' title='Chinese hackers' class='pt-cv-tax-chinese-hackers'>Chinese hackers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-hacking-groups\/' title='Chinese Hacking Groups' class='pt-cv-tax-chinese-hacking-groups'>Chinese Hacking Groups<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-intelligence\/' title='Chinese Intelligence' class='pt-cv-tax-chinese-intelligence'>Chinese Intelligence<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-state-sponsored-cyberattacks\/' title='Chinese state-sponsored cyberattacks' class='pt-cv-tax-chinese-state-sponsored-cyberattacks'>Chinese state-sponsored cyberattacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/national-cyber-threat-assessment\/' title='National Cyber Threat Assessment' class='pt-cv-tax-national-cyber-threat-assessment'>National Cyber Threat Assessment<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/peoples-republic-of-china\/' title='Peoples Republic of China' class='pt-cv-tax-peoples-republic-of-china'>Peoples Republic of China<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Plus brillants exploits: Canadian Centre for Cyber Security fingers Chinese state sponsored hackers ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034795\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/unitedhealth-hires-longtime-cybersecurity-executive-as-ciso\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"UnitedHealth CISO\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/02\/CISO-Cybersecurity-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/unitedhealth-hires-longtime-cybersecurity-executive-as-ciso\/\" class=\"_self cvplbd\" target=\"_self\" >UnitedHealth Hires Longtime Cybersecurity Executive as CISO<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-31T16:19:38-04:00\">October 31, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/healthcare-data-breach\/' title='healthcare data breach' class='pt-cv-tax-healthcare-data-breach'>healthcare data breach<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/unitedhealth\/' title='UnitedHealth' class='pt-cv-tax-unitedhealth'>UnitedHealth<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">UnitedHealth Group, which is still picking up the pieces after a massive ransomware attack that affected more than 100 million people, hired a new and experienced CISO to replace the previous executive ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034602\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/proofpoint-boosting-data-security-with-normalyze-acquisition\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Proofpoint Normalyze data protection\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/TooManyFiles-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/proofpoint-boosting-data-security-with-normalyze-acquisition\/\" class=\"_self cvplbd\" target=\"_self\" >Proofpoint Boosting Data Security with Normalyze Acquisition<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-30T08:31:58-04:00\">October 30, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cloud-data-security\/' title='cloud data security' class='pt-cv-tax-cloud-data-security'>cloud data security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/human-element\/' title='Human Element' class='pt-cv-tax-human-element'>Human Element<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/normalyze\/' title='Normalyze' class='pt-cv-tax-normalyze'>Normalyze<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/proofpoint\/' title='Proofpoint' class='pt-cv-tax-proofpoint'>Proofpoint<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Cybersecurity firm Proofpoint, which is eyeing an IPO in the next 18 months, is buying startup Normalyze to improve its data protection capabilities and mitigate the threat humans present in an increasingly ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034486\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/jpmorgan-chase-bank-glitch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"An unfortunate TikToker shows off his negative balance\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/jpmorgan-chase-glitch-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/jpmorgan-chase-bank-glitch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >TikTok \u2018Infinite Money Glitch\u2019 \u2014 Idiots Chased by JPMorgan<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-29T12:11:23-04:00\">October 29, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/chase-bank\/' title='Chase Bank' class='pt-cv-tax-chase-bank'>Chase Bank<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/disinformation\/' title='disinformation' class='pt-cv-tax-disinformation'>disinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/how-to-be-safe-on-social-media\/' title='how to be safe on social media' class='pt-cv-tax-how-to-be-safe-on-social-media'>how to be safe on social media<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/j-p-morgan-chase\/' title='J.P. Morgan Chase' class='pt-cv-tax-j-p-morgan-chase'>J.P. Morgan Chase<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/jp-morgan-chase\/' title='JP Morgan Chase' class='pt-cv-tax-jp-morgan-chase'>JP Morgan Chase<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/jpmorgan-chase\/' title='JPMorgan Chase' class='pt-cv-tax-jpmorgan-chase'>JPMorgan Chase<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/misinformation\/' title='Misinformation' class='pt-cv-tax-misinformation'>Misinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-disinformation\/' title='online disinformation' class='pt-cv-tax-online-disinformation'>online disinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/social-disinformation\/' title='Social disinformation' class='pt-cv-tax-social-disinformation'>Social disinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/social-media\/' title='social media' class='pt-cv-tax-social-media'>social media<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/socialmedia\/' title='socialmedia' class='pt-cv-tax-socialmedia'>socialmedia<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/software-glitches\/' title='software glitches' class='pt-cv-tax-software-glitches'>software glitches<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/tiktok\/' title='TikTok' class='pt-cv-tax-tiktok'>TikTok<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/x\/' title='X' class='pt-cv-tax-x'>X<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Dimon\u2019s dollars (not yours): No, Chase Bank isn\u2019t going to let you cash bad checks. It\u2019s fraud\u2014no matter what X and TikTok tell you ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034314\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/cyber-scams-why-we-fall-for-them\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Cyber Scams &amp; Why We Fall for Them\" title=\"\" data-cvpsrc=\"https:\/\/www.ciso.inc\/wp-content\/uploads\/2024\/10\/2024_10_-Why-We-Fall-for-It-Blog-Social-Post-1024x845.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/cyber-scams-why-we-fall-for-them\/\" class=\"_self cvplbd\" target=\"_self\" >Cyber Scams &amp; Why We Fall for Them<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/hmeyers\/\" rel=\"author\">hmeyers<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-25T13:00:00-04:00\">October 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/blog-posts\/' title='Blog Posts' class='pt-cv-tax-blog-posts'>Blog Posts<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-threats\/' title='Cyber Threats' class='pt-cv-tax-cyber-threats'>Cyber Threats<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fraud\/' title='Fraud' class='pt-cv-tax-fraud'>Fraud<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/scams\/' title='Scams' class='pt-cv-tax-scams'>Scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/social-engineering\/' title='social engineering' class='pt-cv-tax-social-engineering'>social engineering<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Gary Perkins, Chief Information Security Officer Social engineers rely on two key psychological triggers: urgency and empathy. When people feel rushed or that they are helping someone in need, their normal critical ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=CISO Global&feed_id=1005&blog_url=https:\/\/www.ciso.inc\/feed\/\">CISO Global<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585452\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"50\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"ef621197b023c0d62f954d49ed62c713\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-d03ce1a6rx\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Social Engineering<\/p>\n","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1585452","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Social Engineering - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Social Engineering\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering\" \/>\n<meta property=\"og:description\" content=\"Social Engineering\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-11T07:10:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/social-engineering\/\",\"url\":\"https:\/\/securityboulevard.com\/social-engineering\/\",\"name\":\"Social Engineering - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2017-08-23T19:57:44+00:00\",\"dateModified\":\"2018-01-11T07:10:22+00:00\",\"description\":\"Social Engineering\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/social-engineering\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/social-engineering\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/social-engineering\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Social Engineering - Security Boulevard","description":"Social Engineering","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/social-engineering\/","og_locale":"en_US","og_type":"article","og_title":"Social Engineering","og_description":"Social Engineering","og_url":"https:\/\/securityboulevard.com\/social-engineering\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-01-11T07:10:22+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/social-engineering\/","url":"https:\/\/securityboulevard.com\/social-engineering\/","name":"Social Engineering - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2017-08-23T19:57:44+00:00","dateModified":"2018-01-11T07:10:22+00:00","description":"Social Engineering","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/social-engineering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/social-engineering\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Social Engineering"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-6ErO","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1585452"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585452\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1585452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}