July 2, 2024, 1 p.m. | Doug Bonderud

Security Intelligence securityintelligence.com

Executives hold the keys to the corporate kingdom. If attackers can gain the trust of executives using layered social engineering techniques, they may be able to access sensitive corporate information such as intellectual property, financial data or administrative control logins and passwords. While phishing remains the primary pathway to executive compromise, increasing C-suite awareness of […]


The post  It all adds up: Pretexting in executive compromise appeared first on Security Intelligence.

access artificial intelligence (ai) attackers can compromise control corporate c-suite data engineering executive executives financial financial data hackers information intellectual property keys logins may passwords phishing pretext pretexting property risk management sensitive social social engineering social engineering techniques techniques trust using

More from securityintelligence.com / Security Intelligence

Technology Risk & Controls Manager

@ LegalAndGeneral | London, United Kingdom

Solutions Architect - Prisma Cloud

@ Palo Alto Networks | Munich, Germany

Security Operations Engineer

@ Cognite | Oslo

Ingénieur Cybersécurité PKI

@ Alter Solutions | PARIS, France

Cyber Security Project Engineer

@ Dezign Concepts LLC | Chantilly, VA

Cloud Cybersecurity Incident Response Lead

@ Maveris | Martinsburg, West Virginia, United States