article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Social Engineering: Investigate the human element of cybersecurity by exploring social engineering techniques and tactics used to manipulate individuals. Explore IoT security architectures, protocols, and solutions for securing interconnected devices.

article thumbnail

Webcast Tackles How to Protect Oneself Against the Dark Side of AI

SecureWorld News

The featured speakers are: Rachel Tobac, white hat hacker and CEO, SocialProof Security Rachel is a white hat hacker and the CEO of SocialProof Security, where she helps people and companies keep their data safe by training and pentesting them on social engineering risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New VPN Risk Report by Zscaler Uncovers Hidden Security Risks Impacting Enterprises

CyberSecurity Insiders

2021 Research Highlights Growing Security Vulnerabilities Around Targeted Social Engineering, Ransomware and Malware Attacks. Respondents indicated that social engineering (75%), ransomware (74%), and malware (60%) are the most concerning attack vectors and are often used to exploit users accessing VPNs. Zscaler, Inc.

VPN 125
article thumbnail

Emerging Trends in Cybersecurity: Strategies to Combat Cyber Extortion Attacks on Businesses in 2023

Cytelligence

Embracing Zero Trust Architecture: The traditional perimeter-based security model is no longer sufficient in today’s threat landscape. Zero Trust Architecture (ZTA) is gaining popularity as an effective security framework. Attackers often exploit employees’ lack of awareness through social engineering techniques.

article thumbnail

Zero Trust Can’t Protect Everything. Here’s What You Need to Watch.

eSecurity Planet

Zero trust architecture is an emerging technology in cybersecurity that offers an alternative to the traditional castle-and-moat approach to security. Zero trust architecture requires perpetual maintenance. However, this doesn’t address a glaring issue staring everyone in the face: social engineering.

article thumbnail

2023 Phishing Report Reveals 47.2% Surge in Phishing Attacks Last Year

Security Boulevard

Zscaler ThreatLabz publishes this report year after year to help organizations recognize the social engineering tactics and sophisticated coding used in phishing attacks to prevent costly data breaches.

Phishing 120
article thumbnail

7 Types of Penetration Testing: Guide to Pentest Methods & Types

eSecurity Planet

This will not only help better test the architectures that need to be prioritized, but it will provide all sides with a clear understanding of what is being tested and how it will be tested. Social engineering tests Social engineering is a technique used by cyber criminals to trick users into giving away credentials or sensitive information.