Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Use Social Engineering as Main Entry Point, Report Finds
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Use Social Engineering as Main Entry Point, Report Finds

Highlights

  • Social engineering is currently the top intrusion point for cyber attackers.

  • Financially motivated and nation-state groups drive most of these incidents.

  • Organizations must prioritize human-focused defenses and response readiness.

Ethan Moreno
Last updated: 1 August, 2025 - 9:19 pm 9:19 pm
Ethan Moreno 21 hours ago
Share
SHARE

Cybersecurity professionals face heightened risks as social engineering emerges as the leading method used by attackers to gain unauthorized entry into organizational systems. While technical defenses continue to evolve, human vulnerabilities remain a persistent target for malicious actors seeking financial gain or pursuing state-sponsored objectives. Persistent threat groups and tactics have shifted, with attackers employing increasingly sophisticated ruses to access sensitive information across a broad spectrum of industries. As organizations grapple with this trend, maintaining strong cybersecurity awareness and response strategies has become a key concern for leaders.

Contents
Unit 42 Observes Social Engineering TrendsWhich Groups Are Driving These Attacks?How Does Social Engineering Impact Organizations?

Recent reports differ from those released several years ago, which often highlighted malware, ransomware, or phishing emails as the top initial vectors. Social engineering’s predominance now reflects the growing complexity of attacks combining technical prowess with psychological manipulation. Furthermore, the appearance of nation-state involvements and criminal collectives marks a shift from previously more isolated or less organized incidents. The broader range of victimized companies also underscores the widespread nature of the threat compared to earlier periods where specific industries were primarily targeted.

Unit 42 Observes Social Engineering Trends

Palo Alto Networks’ Unit 42 reports that 36% of the security incidents it investigated over the past year were initiated through social engineering techniques. The investigation encompassed over 700 incident response cases, ranging from small enterprises to Fortune 500 companies, with nearly three-quarters of these attacks affecting organizations in North America. Scattered Spider, also tracked as Muddled Libra, and North Korean threat actors have played key roles in exploiting this approach.

Which Groups Are Driving These Attacks?

Threat groups with differing motivations, from cybercrime collectives to nation-state actors, increasingly rely on social engineering. Financial motives accounted for the vast majority—93%—of these attacks. According to Michael Sikorski, Chief Technology Officer and VP of Engineering at Unit 42,

“We’re constantly engaged with them. It’s just been one after another is what it feels like to us.”

Notably, North Korean operatives have infiltrated the workforce at several multinational firms, using deceptive employment tactics to support their government’s finances.

How Does Social Engineering Impact Organizations?

Data exposure is a prevalent consequence, with social engineering attacks leading to compromised data in 60% of the incidents investigated—significantly higher than that of other intrusion methods. Attackers often target help desk staff, system administrators, and personnel with broad access privileges. Sikorski elaborates,

“Those people often have the privileges to everything that the attacker wants.”

These attacks leverage human trust and access, bypassing technical security layers.

Social engineering’s rise underscores an ongoing challenge in information security: human susceptibility. Cybersecurity teams are now required to expand training, maintain rigorous verification protocols, and routinely assess their incident response capabilities. It is also evident that attackers are refining their methods, focusing more on individuals positioned to facilitate access rather than solely exploiting technical flaws. Increased awareness and actionable safeguards, such as strengthening identity verification processes and educating employees, can help mitigate risks. As attack patterns continue to shift, keeping abreast of threat intelligence remains a vital practice for organizations intent on protecting their assets and data.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Researchers Warn Users Fix Cursor Software to Block Remote Attacks

Secret Blizzard Spies on Embassies, Exploits Russian ISPs

Google Project Zero Speeds Up Vulnerability Disclosures to Vendors

U.S. Companies Face Record Data Breach Costs, IBM Reports

Minnesota Deploys National Guard After Cyberattack Targets St. Paul

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Epic Wins Appeal as Court Curbs Google Play Store Monopoly
Next Article Researchers Warn Users Fix Cursor Software to Block Remote Attacks

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Nextracker Expands AI and Robotics in Solar Operations
AI
Players Solve August 2 Wordle With Fresh Hints and Strategies
Gaming
Hololive Eyes Global Expansion with Gaming Industry Collaborations
Gaming
DiffuseDrive Tackles Real-World Data Gaps for Robot Training
AI
Epic Wins Appeal as Court Curbs Google Play Store Monopoly
Gaming
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?