• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    France claims 'foreign interference' in ferry malware case

    France Alleges ‘Foreign Interference’ After RAT Malware Found on Ferry

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    CVE-2025-20393

    Cisco Warns of Active Cyberattack Exploiting Critical AsyncOS Vulnerability

    Askul cyberattack

    Askul Restarts Logistics as Ransomware Attack Exposes 740,000 Records

    French Interior Ministry cyberattack

    France Arrests 22-Year-Old Suspect in Ministry of the Interior Cyberattack

    KT Cyberattack

    State-Level Cyber Espionage Suspected in KT Telecom Breach

    DPDP rules

    How DPDP Rules Are Quietly Reducing Deepfake and Synthetic Identity Risks

    PDVSA cyberattack

    PDVSA Cyberattack Disrupts Administrative Systems, Oil Cargo Deliveries Suspended

    Cyber AI Profile

    NIST Releases Draft AI Cybersecurity Guidance to Address Risks of Enterprise AI Adoption

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    City of Cambridge

    City of Cambridge Advises Password Reset After Nationwide CodeRED Data Breach

    Digital Arrest, CBI, Digital Arrest Fraud, Cyber Fraud

    CBI Files Charges Against 13 in Digital Arrest Fraud Case Linked to Myanmar Cyber Slave Compounds

    Government Contractor Fraud

    Federal Grand Jury Charges Former Manager with Government Contractor Fraud

    ban on social media

    Australia’s Social Media Ban for Kids: Protection, Overreach or the Start of a Global Shift?

    CBI, Cyber Fraud Network, Chakra-V, Operation Chakra, Covid-19, Fraud

    CBI Files Chargesheet Against 30 Including Two Chinese Nationals in ₹1,000 Cr Cyber Fraud Network

    React2Shell, China

    ‘React2Shell’ Flaw Exploited by China-Nexus Groups Within Hours of Disclosure, AWS Warns

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    Telegram Bots, HTML phishing attack, Telegram bot credential theft, self-contained phishing malware, JavaScript credential harvesting, email security bypass techniques, RFQ phishing scams, invoice phishing attacks, Adobe login phishing, Microsoft credential theft, FedEx phishing campaign, DHL impersonation attack, Central Europe phishing 2025, Eastern Europe cyber threats, Cyble threat intelligence, CryptoJS AES obfuscation, anti-forensics phishing, F12 developer tools blocking, Telegram Bot API abuse, api.telegram.org malicious traffic, credential phishing 2025, HTML attachment malware, business email compromise, targeted phishing campaign, Czech Republic cyber threats, Slovakia phishing attacks, Hungary cybersecurity threats, Germany phishing campaign, Telekom Deutschland phishing, manufacturing sector attacks, automotive industry phishing, government agency phishing, energy utility cyber threats, telecommunications phishing, professional services attacks, garclogtools_bot, v8one_bot, dollsman_bot, dual-capture credential theft, fake login error messages, IP address harvesting, api.ipify.org abuse, ip-api.com malicious use, YARA phishing detection, phishing IOCs 2025, HTML file security risks, RFC-compliant filename spoofing, blurred document phishing, modal login phishing, brand impersonation attacks, CryptoJS malware obfuscation, right-click blocking malware, keyboard shortcut interception, multi-stage credential theft, decentralized phishing infrastructure, phishing toolkit generators, modular phishing templates, German language phishing, Spanish phishing variants

    Cyble Detects Phishing Campaign Using Telegram Bots to Siphon Corporate Credentials

    Vinomofo, Privacy Commissioner

    Vinomofo Failed to Protect Customer Data, Australian Privacy Commissioner Rules

    Andrew Morton, Third-Party Risk Management, third-party risk management, TPRM best practices, vendor risk management, ISO 27001 auditor, SOC 2 validation, vendor tiering strategy, fourth-party risk visibility, risk-based vendor assessment, TPRM metrics, vendor onboarding process, sub-processor management, DPA clauses, adaptive questionnaires, vendor security assessment, GRC automation, supply chain risk management, procurement security alignment, independent assurance reports, vendor control validation, critical vendor management, TPRM stakeholder engagement, security questionnaire alternatives, vendor posture scanning, risk classification criteria, TPRM scalability

    From Spreadsheets to Strategic Defense: Andrew Morton Walks Us Through TPRM Transformation

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    France claims 'foreign interference' in ferry malware case

    France Alleges ‘Foreign Interference’ After RAT Malware Found on Ferry

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    CVE-2025-20393

    Cisco Warns of Active Cyberattack Exploiting Critical AsyncOS Vulnerability

    Askul cyberattack

    Askul Restarts Logistics as Ransomware Attack Exposes 740,000 Records

    French Interior Ministry cyberattack

    France Arrests 22-Year-Old Suspect in Ministry of the Interior Cyberattack

    KT Cyberattack

    State-Level Cyber Espionage Suspected in KT Telecom Breach

    DPDP rules

    How DPDP Rules Are Quietly Reducing Deepfake and Synthetic Identity Risks

    PDVSA cyberattack

    PDVSA Cyberattack Disrupts Administrative Systems, Oil Cargo Deliveries Suspended

    Cyber AI Profile

    NIST Releases Draft AI Cybersecurity Guidance to Address Risks of Enterprise AI Adoption

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    City of Cambridge

    City of Cambridge Advises Password Reset After Nationwide CodeRED Data Breach

    Digital Arrest, CBI, Digital Arrest Fraud, Cyber Fraud

    CBI Files Charges Against 13 in Digital Arrest Fraud Case Linked to Myanmar Cyber Slave Compounds

    Government Contractor Fraud

    Federal Grand Jury Charges Former Manager with Government Contractor Fraud

    ban on social media

    Australia’s Social Media Ban for Kids: Protection, Overreach or the Start of a Global Shift?

    CBI, Cyber Fraud Network, Chakra-V, Operation Chakra, Covid-19, Fraud

    CBI Files Chargesheet Against 30 Including Two Chinese Nationals in ₹1,000 Cr Cyber Fraud Network

    React2Shell, China

    ‘React2Shell’ Flaw Exploited by China-Nexus Groups Within Hours of Disclosure, AWS Warns

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    Telegram Bots, HTML phishing attack, Telegram bot credential theft, self-contained phishing malware, JavaScript credential harvesting, email security bypass techniques, RFQ phishing scams, invoice phishing attacks, Adobe login phishing, Microsoft credential theft, FedEx phishing campaign, DHL impersonation attack, Central Europe phishing 2025, Eastern Europe cyber threats, Cyble threat intelligence, CryptoJS AES obfuscation, anti-forensics phishing, F12 developer tools blocking, Telegram Bot API abuse, api.telegram.org malicious traffic, credential phishing 2025, HTML attachment malware, business email compromise, targeted phishing campaign, Czech Republic cyber threats, Slovakia phishing attacks, Hungary cybersecurity threats, Germany phishing campaign, Telekom Deutschland phishing, manufacturing sector attacks, automotive industry phishing, government agency phishing, energy utility cyber threats, telecommunications phishing, professional services attacks, garclogtools_bot, v8one_bot, dollsman_bot, dual-capture credential theft, fake login error messages, IP address harvesting, api.ipify.org abuse, ip-api.com malicious use, YARA phishing detection, phishing IOCs 2025, HTML file security risks, RFC-compliant filename spoofing, blurred document phishing, modal login phishing, brand impersonation attacks, CryptoJS malware obfuscation, right-click blocking malware, keyboard shortcut interception, multi-stage credential theft, decentralized phishing infrastructure, phishing toolkit generators, modular phishing templates, German language phishing, Spanish phishing variants

    Cyble Detects Phishing Campaign Using Telegram Bots to Siphon Corporate Credentials

    Vinomofo, Privacy Commissioner

    Vinomofo Failed to Protect Customer Data, Australian Privacy Commissioner Rules

    Andrew Morton, Third-Party Risk Management, third-party risk management, TPRM best practices, vendor risk management, ISO 27001 auditor, SOC 2 validation, vendor tiering strategy, fourth-party risk visibility, risk-based vendor assessment, TPRM metrics, vendor onboarding process, sub-processor management, DPA clauses, adaptive questionnaires, vendor security assessment, GRC automation, supply chain risk management, procurement security alignment, independent assurance reports, vendor control validation, critical vendor management, TPRM stakeholder engagement, security questionnaire alternatives, vendor posture scanning, risk classification criteria, TPRM scalability

    From Spreadsheets to Strategic Defense: Andrew Morton Walks Us Through TPRM Transformation

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Social Engineering 2023: What has Changed?

In this article, we explore the changing landscape of social engineering, new techniques being used by cybercriminals and the latest trends.

Ashish Khaitan by Ashish Khaitan
April 14, 2023
in Features, Firewall Daily
0
Social Engineering 2023
942
SHARES
5.2k
VIEWS
Share on LinkedInShare on Twitter

The cybersecurity world constantly faces new threats as the cyber crime world continues to evolve as hackers and threat actors come up with varied techniques to target government, organizations and individuals.

Among these attacks, social engineering has emerged to be a popular method used by cybercriminals and continues to be a prevalent threat.

In 1984, Dutch industrialist J.C. Van Marken was first believed to have used the term social engineering, which is a way to manipulates unsuspecting victims into giving confidential information.

Once the threat actor has the details, they can use a variety of tactics, including phishing, pretexting, and baiting, to carry out cyber attacks.

Despite the increase in cybersecurity efforts, the tactics used by cybercriminals have become increasingly sophisticated and harder to detect. 

In this article, we explore the changing landscape of social engineering 2023, new techniques being used by cybercriminals and the upcoming trends. We also take a look at AI in social engineering 2023 and the rise of deepfake technology in cyber attacks. 

report-ad-banner

Social Engineering 2023: What has changed?

Since the inception of computer malware, social engineering has been the main module of how and when malware is delivered. It is also the core foundation of hackers selecting their victims before launching an attack.

However, the social engineering 2023 phase has undergone various changes. In 2023, social engineering is expected to be among the top priorities of companies and the cybersecurity sector.

The reason is — one can prepare for an attack but not for data leaks inside the organization, often caused by human error. 

Social Engineering 2023: Top 5 techniques 

As technology advances, the social engineering threats have become harder to detect. Cybercriminals continue to hone their skills, using increasingly sophisticated tactics that are difficult to identify and thwart. Here are some of the top social engineering techniques used by cybercriminals.   

Phishing

Phishing is a form of social engineering that has been a persistent threat for years and is still prevalent in the social engineering 2023 era.

The technique involves using emails, text messages, or other forms of communication to deceive individuals into revealing sensitive information, such as their login credentials or financial data. 

Cybercriminals often create fake emails from trustworthy sources like banks, government agencies, or reputable online retailers.

The emails typically contain links that lead to fraudulent websites that look identical to the real ones. Once users enter their personal information on these bogus sites, cybercriminals can collect and exploit their sensitive data for malicious purposes.

Baiting

In social engineering, baiting is a strategy that involves offering something desirable to a target in exchange for access to their sensitive information or system.

Examples of bait could include free downloads, fake job postings, or counterfeit products. In social engineering 2023 trends, baiting attacks have become more advanced and harder to detect. 

Today’s cybercriminals may use more effective social engineering methods, such as building fake social media profiles or advertising a false business opportunity, to lure in their victims.

The bait may also be disguised as a genuine object that the target is more likely to trust and accept, like a branded USB drive. Once the target takes the bait, the cybercriminal gains access to their system or confidential data, leaving the victim vulnerable to exploitation.

Pretexting

Pretexting is a social engineering technique that fabricates a false scenario or pretext to trick individuals into divulging sensitive information or granting access to secure systems. In 2023, pretexting continues to be a popular tactic malicious actors use in social engineering attacks. 

The attacker will typically concoct a plausible story or pretext to gain the victim’s trust, often posing as someone they are familiar with, like a co-worker or vendor.

They may also pretend to conduct a survey or investigation to gain more information. To enhance their deceitful scheme, they might employ social engineering methods, such as phishing emails or phone calls, to further manipulate the victim and extract additional confidential data.

Tailgating

Tailgating remains a social engineering tactic where attackers attempt to gain unauthorized physical access to secure areas, such as offices or data centers.

The attacker will position themselves near a designated access point, such as a door or turnstile, and follow behind an authorized individual with access to the secured area.

In doing so, the attacker can bypass any security protocols or measures, such as key cards or biometric scanners, that may be in place.

Virtual tailgating is another threat that can occur when cybercriminals follow closely behind authorized users in a virtual environment. These attackers may use social engineering techniques like phishing emails to enter sensitive information.

By taking advantage of the authorized users, tailgating in both physical and virtual environments can lead to a breach in security and pose a significant risk to an organization’s security posture.

Dumpster Diving

Dumpster diving is a popular social engineering technique that most companies neglect. However, with the current social engineering 2023 trends, dumpster diving is no less than a gold mine for hungry hackers.

The technique involves searching through garbage or waste disposal sites to uncover sensitive or confidential information. This can include discarded documents, such as bank statements, credit card receipts, or personal identification information, which can be used for malicious purposes. 

In 2023, dumpster diving may still be viable for cybercriminals to obtain sensitive information, particularly as more businesses and individuals move toward digital storage and communication.

Nevertheless, social engineers may also use other tactics, such as phishing scams or pretexting, to extract confidential information. Individuals and organizations must know these tactics and take appropriate measures to protect sensitive information. 

What has changed in social engineering 2023 trends?

For many years, hackers and cybercriminals have used social engineering techniques to gain unauthorized access to confidential information.

However, in recent years, there has been a marked surge in the prevalence and complexity of these attacks. Several cybersecurity experts have predicted that social engineering 2023 tactics will continue advancing in sophistication and frequency.

Cybercriminals have become more adept at exploiting human nature and psychology to persuade people to divulge sensitive information or carry out specific actions.

They utilize various tactics to achieve their objectives, such as phishing, pretexting, baiting, tailgating, dumpster diving, and more. 

Thus, it is more than necessary for individuals and organizations to be aware of these techniques and take steps to safeguard themselves against these attacks.

This may include implementing robust security measures, educating employees about social engineering risks, and adopting new technology before threat actors.

AI in social engineering 2023

The malicious use of artificial intelligence (AI) in social engineering can lead to the manipulation of human behavior, resulting in the theft of personal information or the deception of individuals into performing actions that benefit the attacker. 

By utilizing psychological manipulation and exploiting human vulnerabilities, social engineering attacks can become even more effective with the help of AI.

Automating data collection and creating persuasive messages can significantly enhance the potential impact of such attacks.

Deepfake

The rise of deepfake technology has introduced a new avenue for social engineering attacks, where artificial intelligence (AI) can be used to deceive individuals into believing false information.

Deepfakes leverage machine learning algorithms to create highly realistic images, audio, and videos that can easily fool viewers into thinking they are authentic.

Deep fakes in social engineering attacks can impersonate high-profile individuals, such as celebrities or government officials, and spread false information.

For instance, a deepfake video of a politician making controversial statements could manipulate public opinion, sow discord, or influence election outcomes. The potential for harm is immense, highlighting the urgent need for effective countermeasures to prevent the malicious use of deepfake technology.

Vishing

Vishing, also known as voice phishing, is a social engineering attack that utilizes voice communication, often via phone, to deceive individuals into divulging sensitive information, including passwords, bank account details, or social security numbers.

These attacks are often carried out by impersonating trustworthy entities, such as government agencies, banks, or technical support representatives, and employing various tactics to gain the victim’s confidence.

The attacker may use spoofing techniques to make it appear that the call originates from a legitimate phone number, such as the victim’s bank or employer.

In addition, social engineering techniques may be employed to manipulate the victim’s emotions, such as instilling fear or urgency, to pressure them into providing sensitive information, or taking action that benefits the attacker.

Smishing

Smishing, or SMS phishing, is a social engineering attack that leverages text messages to deceive individuals into divulging sensitive information or taking action that benefits the attacker.

Smishing attacks are similar to phishing attacks, but instead of email, the attacker uses text messages to deliver their message.

In many cases, smishing attacks involve the attacker posing as a trusted entity, such as a bank, government agency, or technology company, and employing various tactics to gain the victim’s confidence.

For instance, the attacker may send a text message claiming that there has been unusual activity on the victim’s account and requesting that they provide their account number and password to verify their identity.

Influence tactics

Influence tactics refer to the methods utilized by social engineers to sway individuals or groups into undertaking a specific action or revealing confidential information.

Scammers often pose as authoritative figures to achieve this objective, thereby gaining compliance or knowledge from the targeted individuals.

Moreover, social engineers may create a sense of urgency or scarcity to pressure the targets to provide information or take action.

Additionally, they build rapport with the targets by creating a sense of trust and likability, which aids in gaining compliance or knowledge.

Social Engineering 2023: Summing up everything 

As the sophistication of social engineering attacks continues to increase, they pose a significant threat to individuals and organizations.

Vigilance against these attacks is crucial to safeguard personal information, prevent financial losses, maintain business continuity, and comply with regulatory requirements.

To effectively mitigate the risks of social engineering attacks, individuals and organizations must adopt security best practices, educate their employees, and remain current with the latest security threats. They can significantly reduce their susceptibility to these attacks by taking these measures.

The rise in popularity of the Internet of Things (IoT) and connected devices presents a new avenue for cybercriminals to exploit vulnerabilities and launch social engineering attacks.

Therefore, remaining vigilant, adopting security best practices, and continuously educating oneself on the latest security threats are vital to reducing the risk of social engineering attacks in the future.

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • More
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Social Engineering 2023Social Engineering 2023: Top 5 techniques
Previous Post

Zero-day Vulnerability in Microsoft Windows Used in Nokoyawa Ransomware Attacks

Next Post

Cryptocurrency Phishing Grows by 40% in One Year

Next Post
Cryptocurrency Phishing

Cryptocurrency Phishing Grows by 40% in One Year

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

France claims 'foreign interference' in ferry malware case
Cyber News

France Alleges ‘Foreign Interference’ After RAT Malware Found on Ferry

December 18, 2025
FBI Seizes E-Note Crypto Exchange
Cyber News

FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

December 18, 2025
CVE-2025-20393
Firewall Daily

Cisco Warns of Active Cyberattack Exploiting Critical AsyncOS Vulnerability

December 18, 2025
Fraudulent Call Centres in Ukraine
Cyber News

EU Authorities Dismantle Fraudulent Call Centres in Ukraine Behind €10M Scam Network

December 18, 2025

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2025 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2025 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information