{"id":76436,"date":"2025-04-29T13:35:10","date_gmt":"2025-04-29T10:35:10","guid":{"rendered":"https:\/\/gulftech-news.com\/en\/?p=76436"},"modified":"2025-04-29T13:35:12","modified_gmt":"2025-04-29T10:35:12","slug":"social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report","status":"publish","type":"post","link":"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/","title":{"rendered":"Social Engineering Surges as Key Attack Vector according to Proofpoint\u2019s Latest Human Factor Report"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint-.jpeg\" alt=\"\" class=\"wp-image-76437\" srcset=\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint-.jpeg?v=1745922871 800w, https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint--300x300.jpeg?v=1745922871 300w, https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint--150x150.jpeg?v=1745922871 150w, https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint--768x768.jpeg?v=1745922871 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\">Selena Larson, Senior Threat Intelligence Analyst at Proofpoint<\/figcaption><\/figure>\n\n\n\n<p><strong><a href=\"https:\/\/www.proofpoint.com\/us\">Proofpoint, Inc<\/a><\/strong>., a leading cybersecurity and compliance company, today announced the first volume of its 2025 Human Factor Report, offering insights into how cybercriminals are evolving their tactics, with social engineering emerging as the primary threat to organizations worldwide.<\/p>\n\n\n\n<p>A hacker\u2019s most dangerous tool might not be a malicious link or sophisticated malware. Instead, it might be their ability to hack your brain using fake personas, seemingly innocent conversations, and believable stories to get you to take action. Under the right circumstances, clever social engineering can be more effective than any technical attack.<\/p>\n\n\n\n<p>Some key findings from Proofpoint\u2019s 2025 Human Factor Report: Social Engineering include:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Threats Are Exploding to Multiple Channels\u2014And Harder to Detect<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Proofpoint blocks 117 million TOAD (Telephone-Oriented Attack Delivery) attacks annually: these threats often rely on pure social engineering, bypassing traditional security defenses that look for malicious links or attachments.<\/li>\n\n\n\n<li>TOAD attacks use telemarketer techniques to manipulate people into infecting themselves by calling a number to install remote access tools and other malware \u2014highlighting how cyberattacks are jumping channels beyond email.<\/li>\n\n\n\n<li>Similar tricks that manipulate people into installing malicious software themselves are expanding to collaboration and messaging platforms like Microsoft Teams<\/li>\n\n\n\n<li>Click Fix and fake updates\/ web injects also follow<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Revenues from cryptocurrency-related fraud Surge 40%\u2014With a Twist<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cryptocurrency-related frauds are making more money outside of romance fraud, expanding to job fraud.<\/li>\n\n\n\n<li>Global losses hit $3.9 billion, with a 210% increase in the number of deposits in 2024 alone.<\/li>\n\n\n\n<li>While the number of victims skyrocketed, the average deposit shrank, suggesting attackers are widening the net to scam smaller payments from a larger victim pool<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Generative AI Is Enabling Multilingual, Regionally Targeted Fraud<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Most of the fraud that\u2019s tracked by researchers is in English. However, Proofpoint also observes non-English language fraud.<\/li>\n\n\n\n<li>As generative AI becomes more common, threat actors will likely be able to expand their target pool by better tailoring social engineering to specific locations and languages.<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Benign Conversations Used by APTs Are on the Rise<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>About 25% of all state-sponsored phishing campaigns now begin with \u201cbenign\u201d emails to build trust\u2014a striking shift toward psychological manipulation over technical exploits.<\/li>\n\n\n\n<li>90% of these messages pretend to be interested in collaboration and engagement.<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Advanced Fee Fraud (AFF) Up 47%, Extortion Down 68%<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>There\u2019s a notable pivot from fear-based extortion to enticement-based scams. AFF scams like fake job offers or giveaways are proving more effective than threats.<\/li>\n\n\n\n<li>Even Taylor Swift\u2019s Eras Tour was impersonated for fraudulent job offers.<\/li>\n<\/ul>\n\n\n\n<p>Selena Larson, Senior Threat Intelligence Analyst at Proofpoint, said, \u201cAs generative AI becomes more common, threat actors will likely be able to expand their target pool by better tailoring social engineering to specific locations and languages. But it\u2019s important to remember that it doesn\u2019t matter whether emails are generated with AI or by an actual human, detection against these threats remains the same.\u201d<\/p>\n\n\n\n<p>From fraud to espionage, one tactic continues to dominate the threat landscape: social engineering. Whether phishing, impersonation, or AI-generated lures, cybercriminals are using psychology to get people to talk back. Proofpoint data shows that in most attacks, the technical details matter far less than human behavior. That\u2019s why the path forward is not just smarter technology, but a smarter, human-centric defense.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Selena Larson, Senior Threat Intelligence Analyst at Proofpoint Proofpoint, Inc., a leading cybersecurity and compliance company, today announced the first volume of its 2025 Human Factor Report, offering insights into how cybercriminals are evolving their tactics, with social engineering emerging as the primary threat to organizations worldwide. A hacker\u2019s most dangerous tool might not be &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[644],"tags":[2272,2271,1315],"class_list":["post-76436","post","type-post","status-publish","format-standard","hentry","category-communications-technology","tag-attack-vector-according","tag-human-factor-report","tag-proofpoint"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Social Engineering Surges as Key Attack Vector according to Proofpoint\u2019s Latest Human Factor Report - Gulf Tech News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering Surges as Key Attack Vector according to Proofpoint\u2019s Latest Human Factor Report - Gulf Tech News\" \/>\n<meta property=\"og:description\" content=\"Selena Larson, Senior Threat Intelligence Analyst at Proofpoint Proofpoint, Inc., a leading cybersecurity and compliance company, today announced the first volume of its 2025 Human Factor Report, offering insights into how cybercriminals are evolving their tactics, with social engineering emerging as the primary threat to organizations worldwide. A hacker\u2019s most dangerous tool might not be &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/\" \/>\n<meta property=\"og:site_name\" content=\"Gulf Tech News\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-29T10:35:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-29T10:35:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint-.jpeg?v=1745922871\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"bessan helmi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bessan helmi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/\",\"url\":\"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/\",\"name\":\"Social Engineering Surges as Key Attack Vector according to Proofpoint\u2019s Latest Human Factor Report - Gulf Tech News\",\"isPartOf\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint-.jpeg\",\"datePublished\":\"2025-04-29T10:35:10+00:00\",\"dateModified\":\"2025-04-29T10:35:12+00:00\",\"author\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\"},\"breadcrumb\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/#primaryimage\",\"url\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint-.jpeg?v=1745922871\",\"contentUrl\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint-.jpeg?v=1745922871\",\"width\":800,\"height\":800,\"caption\":\"Selena Larson, Senior Threat Intelligence Analyst at Proofpoint\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gulftech-news.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering Surges as Key Attack Vector according to Proofpoint\u2019s Latest Human Factor Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\",\"url\":\"https:\/\/gulftech-news.com\/en\/\",\"name\":\"Gulf Tech News\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gulftech-news.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\",\"name\":\"bessan helmi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"caption\":\"bessan helmi\"},\"url\":\"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Engineering Surges as Key Attack Vector according to Proofpoint\u2019s Latest Human Factor Report - Gulf Tech News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/","og_locale":"en_US","og_type":"article","og_title":"Social Engineering Surges as Key Attack Vector according to Proofpoint\u2019s Latest Human Factor Report - Gulf Tech News","og_description":"Selena Larson, Senior Threat Intelligence Analyst at Proofpoint Proofpoint, Inc., a leading cybersecurity and compliance company, today announced the first volume of its 2025 Human Factor Report, offering insights into how cybercriminals are evolving their tactics, with social engineering emerging as the primary threat to organizations worldwide. A hacker\u2019s most dangerous tool might not be &hellip;","og_url":"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/","og_site_name":"Gulf Tech News","article_published_time":"2025-04-29T10:35:10+00:00","article_modified_time":"2025-04-29T10:35:12+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint-.jpeg?v=1745922871","type":"image\/jpeg"}],"author":"bessan helmi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"bessan helmi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/","url":"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/","name":"Social Engineering Surges as Key Attack Vector according to Proofpoint\u2019s Latest Human Factor Report - Gulf Tech News","isPartOf":{"@id":"https:\/\/gulftech-news.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/#primaryimage"},"image":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/#primaryimage"},"thumbnailUrl":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint-.jpeg","datePublished":"2025-04-29T10:35:10+00:00","dateModified":"2025-04-29T10:35:12+00:00","author":{"@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c"},"breadcrumb":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/#primaryimage","url":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint-.jpeg?v=1745922871","contentUrl":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/04\/Selena-Larson-Senior-Threat-Intelligence-Analyst-at-Proofpoint-.jpeg?v=1745922871","width":800,"height":800,"caption":"Selena Larson, Senior Threat Intelligence Analyst at Proofpoint"},{"@type":"BreadcrumbList","@id":"https:\/\/gulftech-news.com\/en\/2025\/04\/29\/social-engineering-surges-as-key-attack-vector-according-to-proofpoints-latest-human-factor-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gulftech-news.com\/en\/"},{"@type":"ListItem","position":2,"name":"Social Engineering Surges as Key Attack Vector according to Proofpoint\u2019s Latest Human Factor Report"}]},{"@type":"WebSite","@id":"https:\/\/gulftech-news.com\/en\/#website","url":"https:\/\/gulftech-news.com\/en\/","name":"Gulf Tech News","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gulftech-news.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c","name":"bessan helmi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","caption":"bessan helmi"},"url":"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/"}]}},"_links":{"self":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/76436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/comments?post=76436"}],"version-history":[{"count":1,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/76436\/revisions"}],"predecessor-version":[{"id":76438,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/76436\/revisions\/76438"}],"wp:attachment":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/media?parent=76436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/categories?post=76436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/tags?post=76436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}