AI-driven social engineering attacks redefined cyber risk in 2025. From deepfake voices and cloned documents to coordinated attacks on private phones, messaging apps and supplier platforms, attackers now imitate real workflows and identities. Discover how these attacks unfold, why they work, and what organisations must prioritise next to stay secure.
Cybersecurity experts propose 10 practical, human-centred tactics to help companies create a strong cybersecurity awareness culture. Turn secure behaviour into a natural part of everyday work with tips from storytelling to habit forming, personal ownership to friction shaping. Include creative elements and a sense of fun to deepen and normalise cybersecurity engagement.
London, 6 March 2025 – 87% of security professionals report that their organisation has encountered an AI-driven cyberattack in the last year, according to a new study by SoSafe, Europe’s largest security awareness and human risk management solution. The finding comes from SoSafe’s 2025 Cybercrime Trends, a comprehensive survey of 500 global security professionals as […]
In man-in-the-middle (MitM) attacks, a malicious actor intercepts communication between two parties without their knowledge or consent, which allows the attacker to eavesdrop on the conversation, altering or stealing information exchanged between the two parties.
Pretexting is a social engineering technique where an attacker fabricates a scenario and assumes a false identity to manipulate individuals into divulging confidential information or performing actions that compromise security.
Doxxing is a malicious online scheme that involves exposing private information about individuals or organisations in the digital arena, setting the stage for security breaches and relentless harassment.
An MFA fatigue attack is a tactic where attackers flood a user with repeated multi-factor authentication requests, exploiting the user’s decreasing alertness due to exhaustion. This vulnerability is then used to breach an account or system.
Shadow IT represents the hidden side of cyber security where employees use software, hardware, or cloud services behind the scenes, without IT’s approval, inadvertently paving the way for cybercriminals.
Malware is a blanket term for any type of malicious software designed by cybercriminals to infiltrate a system. From viruses and worms to ransomware and trojans, malware can take many forms and have very diverse consequences on your devices.