92
you are viewing a single comment's thread
view the rest of the comments
[-] onslaught545@lemmy.zip 19 points 4 days ago

Yup, it is. Social engineering is by far the most effective means of gaining unlawful access to any system.

Humans are always the weakest link.

[-] sugar_in_your_tea@sh.itjust.works 11 points 4 days ago

Exactly. Many breaches follow this pattern:

  1. Learn the name and some basic details about the secretary or something
  2. Call corporate tech support asking for a password reset claiming to be the secretary
  3. Access important stuff since secretaries have a surprising amount of access

Replace "secretary" with some other relevant individual who has a surprising amount of access and wouldn't attract attention.

this post was submitted on 23 Jul 2025
92 points (100.0% liked)

Cybersecurity

7904 readers
8 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS