Social engineering attacks on the rise

September 25, 2023

Cybercriminals are becoming more sophisticated in their social engineering tactics, and companies need to rethink their cyber defense strategies to keep up.

Attacks including cyberattacks on industry giants MGM Resorts and Caesars Entertainment, have underscored the pressing need for companies to fortify their security measures.

Social engineering attacks are designed to trick people into revealing confidential information or performing actions that compromise security. They can be carried out through a variety of means, such as phishing emails, phone calls, text messages, and social media.

74% of data breaches between November 2021 and October 2022 involved a human element via an error, privilege misuse, social engineering or use of stolen credentials, according to Verizon’s 2023 data breach investigations report.

The surge in social engineering attacks is due in part to the fact that employees are often the weakest link in a company’s security posture. Social engineering attacks can be particularly effective because they exploit human psychology. For example, attackers may use urgency or scarcity to create a sense of panic, or they may impersonate a trusted authority figure to gain trust.

Two recent examples of high-profile social engineering attacks include the MGM Resorts and Caesars Entertainment breaches. In both cases, hackers were able to gain access to the companies’ networks by targeting their outsourced IT vendors.

These attacks highlight the importance of having robust security measures in place for all third-party vendors.

To combat these threats, experts emphasize the necessity of personalized employee training and awareness programs. Ashley Rose, CEO of Living Security, advises organizations to leverage collected data to tailor internal security controls, like stricter email filters, for those most susceptible to deception.

The sources for this piece include an article in Axios.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn