AI-driven social engineering attacks: 2025 trends

AI-driven social engineering attacks redefined cyber risk in 2025. From deepfake voices and cloned documents to coordinated attacks on private phones, messaging apps and supplier platforms, attackers now imitate real workflows and identities. Discover how these attacks unfold, why they work, and what organisations must prioritise next to stay secure.

10 impactful ways to improve cybersecurity awareness with behavioural insights

Cybersecurity experts propose 10 practical, human-centred tactics to help companies create a strong cybersecurity awareness culture. Turn secure behaviour into a natural part of everyday work with tips from storytelling to habit forming, personal ownership to friction shaping. Include creative elements and a sense of fun to deepen and normalise cybersecurity engagement.

Global businesses face escalating AI risk, as 87% hit by AI cyberattacks

London, 6 March 2025 – 87% of security professionals report that their organisation has encountered an AI-driven cyberattack in the last year, according to a new study by SoSafe, Europe’s largest security awareness and human risk management solution.  The finding comes from SoSafe’s 2025 Cybercrime Trends, a comprehensive survey of 500 global security professionals as […]

Man-in-the-Middle Attack

In man-in-the-middle (MitM) attacks, a malicious actor intercepts communication between two parties without their knowledge or consent, which allows the attacker to eavesdrop on the conversation, altering or stealing information exchanged between the two parties.

Pretexting

Pretexting is a social engineering technique where an attacker fabricates a scenario and assumes a false identity to manipulate individuals into divulging confidential information or performing actions that compromise security.

Doxxing

Doxxing is a malicious online scheme that involves exposing private information about individuals or organisations in the digital arena, setting the stage for security breaches and relentless harassment.

MFA Fatigue Attack

An MFA fatigue attack is a tactic where attackers flood a user with repeated multi-factor authentication requests, exploiting the user’s decreasing alertness due to exhaustion. This vulnerability is then used to breach an account or system.

Shadow IT

Shadow IT represents the hidden side of cyber security where employees use software, hardware, or cloud services behind the scenes, without IT’s approval, inadvertently paving the way for cybercriminals.

Malware

Malware is a blanket term for any type of malicious software designed by cybercriminals to infiltrate a system. From viruses and worms to ransomware and trojans, malware can take many forms and have very diverse consequences on your devices.

Experience our products first-hand

Use our online test environment to see how our platform can help you empower your team to continuously avert cyber threats and keep your organization secure.

The Forrester Wave™ Strong Performer 2024: Human Risk Management Solutions

This page is not available in English yet.

Diese Seite ist noch nicht in Ihrer Sprache verfügbar. Sie können auf Englisch fortfahren oder zur deutschen Startseite zurückkehren.

Cette page n’est pas encore disponible dans votre langue. Vous pouvez continuer en anglais ou revenir à la page d’accueil en français.

Deze pagina is nog niet beschikbaar in uw taal. U kunt doorgaan in het Engels of terugkeren naar de Nederlandse startpagina.

Esta página aún no está disponible en español. Puedes continuar en inglés o volver a la página de inicio en español.

Questa pagina non è ancora disponibile nella tua lingua. Puoi continuare in inglese oppure tornare alla home page in italiano.