{"id":201,"date":"2025-07-02T12:48:27","date_gmt":"2025-07-02T12:48:27","guid":{"rendered":"https:\/\/cyberpranava.com\/?p=201"},"modified":"2025-07-02T13:21:48","modified_gmt":"2025-07-02T13:21:48","slug":"social-engineering","status":"publish","type":"post","link":"https:\/\/cyberpranava.com\/index.php\/2025\/07\/02\/social-engineering\/","title":{"rendered":"Social Engineering (Part-1)"},"content":{"rendered":"\n<p>When we think of cybersecurity audits, we often picture assessments of technical vulnerabilities, compliance checks, and security frameworks. However, <strong>70%-90%<\/strong> of cyberattacks exploit<strong> the weakest link in the security chain\u2014humans<\/strong>. The role of human factors in cybersecurity risks has been evident throughout history, from the <strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Trojan_Horse\">Trojan Horse<\/a><\/strong> in The Odyssey to modern-day cyber threats. This Blog highlights the critical influence of human behavior, decision-making, and organizational culture in cybersecurity audits.<br><\/p>\n\n\n\n<p>As cybersecurity expert <strong><em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Kevin_Mitnick\">Kevin Mitnick <\/a><\/em><\/strong>once said: \u201c<strong>It\u2019s often easier to trick a person on the inside than it is to crack air-tight cybersecurity measures.<\/strong>\u201d Social engineering attacks leverage psychology to manipulate insiders, bypassing even the most robust security defenses.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Threat actors exploit publicly available information through OSINT to craft targeted attacks, preying on cognitive biases and social influence.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>This session introduces the 7 Vulnerabilities of the Human OS, which I term:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Reciprocity<\/li>\n\n\n\n<li>Scarcity<\/li>\n\n\n\n<li>Authority<\/li>\n\n\n\n<li>Liking<\/li>\n\n\n\n<li>Commitment &amp; Consistency<\/li>\n\n\n\n<li>Consensus &amp; Social Proof<\/li>\n\n\n\n<li>Unity<\/li>\n<\/ol>\n\n\n\n<p>These psychological triggers have led to major breaches, including the 2019 Toyota BEC Scam, 2020 Shark Tank Spear Phish, and the 2020 Twitter Bitcoin Scam.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>To enhance cybersecurity resilience, organizations must integrate social engineering awareness into audit frameworks. By incorporating human risk assessments and training programs into audits, companies can proactively mitigate threats and foster a culture of security awareness.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The importance of being aware of Social Engineering as an threat to your organization. Part 1<\/p>\n","protected":false},"author":2,"featured_media":202,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,10],"tags":[8,7,6],"class_list":["post-201","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-organization-sec","category-social-engeering","tag-cybersecurity","tag-hacking","tag-soical-engineering"],"_links":{"self":[{"href":"https:\/\/cyberpranava.com\/index.php\/wp-json\/wp\/v2\/posts\/201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberpranava.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberpranava.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberpranava.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberpranava.com\/index.php\/wp-json\/wp\/v2\/comments?post=201"}],"version-history":[{"count":4,"href":"https:\/\/cyberpranava.com\/index.php\/wp-json\/wp\/v2\/posts\/201\/revisions"}],"predecessor-version":[{"id":210,"href":"https:\/\/cyberpranava.com\/index.php\/wp-json\/wp\/v2\/posts\/201\/revisions\/210"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberpranava.com\/index.php\/wp-json\/wp\/v2\/media\/202"}],"wp:attachment":[{"href":"https:\/\/cyberpranava.com\/index.php\/wp-json\/wp\/v2\/media?parent=201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberpranava.com\/index.php\/wp-json\/wp\/v2\/categories?post=201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberpranava.com\/index.php\/wp-json\/wp\/v2\/tags?post=201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}