Social Engineering

Social engineering exploits human psychology rather than technical vulnerabilities. Coverage of phishing, vishing, smishing, pretexting, help desk impersonation, MFA fatigue, and the AI-augmented manipulation tactics threat actors use to bypass technical controls — alongside the training, verification workflows, and policies that disrupt them.