a beginner's take on social engineering

A Beginner’s Take on Social Engineering – Part 1

I’ll be honest, I never expected to see myself here… I’ve looked for well over a year at positions within […] ... Read More
impersonating confidence

Impersonating Confidence

For some, lack of confidence could mean they’re not very sociable. For others, it could be crippling and could hold […] ... Read More
How SE Helped Me in Public Speaking

How SE Helped Me in Public Speaking

Public speaking is something that many people struggle with. In fact, 75% of the population has a fear of public […] ... Read More
artificial intelligence the evolution of social engineering

Artificial Intelligence: The Evolution of Social Engineering

In the ever-evolving landscape of cybersecurity, social engineering has undergone significant transformations over the years, propelled by advancements in technology. […] ... Read More
Becoming a Human Risk Analyst

The Journey to Becoming a Human Risk Analyst

When people hear that I get to write phishing emails and make vishing calls for a living, the first question […] ... Read More
Child Safety on the Internet

Child Safety on the Internet

“How do I keep my child safe on the internet?” This question is hard to answer in a few minutes […] ... Read More
An Empathic Approach to Security Testing

An Empathic Approach to Security Education

What would you say are some traits of someone who is empathic? I would say some of those attributes would […] ... Read More
End of Year Scams

End of Year Scams

As 2023 comes to an end, it brings along with it a time many people look forward to: the holiday […] ... Read More
How Bad Actors Exploit World Tragedy

How Bad Actors Exploit World Tragedy

The world is no stranger to tragedy. From natural disasters to global pandemics and geopolitical conflicts, we have all witnessed […] ... Read More
Impersonation Scams

Impersonation Scams: Why Are They So Dangerous?

At Social-Engineer, we define impersonation as “the practice of pretexting as another person with the goal of obtaining information or […] ... Read More

Secure Guardrails