Social-Engineering
Telegram Investment Scams Exploiting Users in 2026
Analysis of Telegram investment scams in 2026, including impersonation tactics, fake trading groups, withdrawal fraud, and credential theft patterns.
WhatsApp Impersonation Scams Targeting Users
Analysis of WhatsApp impersonation scams, including account takeover tactics, social engineering methods, and real-world exploitation patterns.
Tech Support & Remote Access Scam — Impersonation, Remote Control & Financial Fraud
Tech support and remote access scams involve impersonation of legitimate service providers to trick victims into granting remote control or making fraudulent payments. This SECMONS record explains how these scams operate and how to prevent compromise.
Phishing — Deceptive Social Engineering to Steal Credentials and Deliver Malware
Phishing is a social engineering technique where attackers impersonate trusted entities to steal credentials, deliver malware, or gain initial access. This SECMONS glossary entry explains phishing variants, operational impact, and defensive controls.
Fake Job Offer Scams Targeting Candidates in 2026
Analysis of fake job offer scams in 2026, including tactics, platforms used, and how attackers exploit job seekers.
Unpaid Toll Text Scam Explained and How to Avoid It
Detailed analysis of the unpaid toll text scam, a widespread SMS phishing campaign impersonating toll authorities to steal payment data and financial credentials.
MGM Resorts Cyberattack 2023: Casino Systems Down
Investigative analysis of the MGM Resorts cyberattack in 2023 where social engineering led to widespread system outages across casinos, hotels, and digital services.
Caesars Entertainment Breach 2023: Casino Giant Hit
Investigative analysis of the Caesars Entertainment breach in 2023 where attackers accessed loyalty program data following a social engineering intrusion.
Evolution of Phishing in Modern Cyber Attacks
Deep analysis of how phishing has evolved into advanced identity-driven attack techniques, including token theft, MFA bypass, and targeted social engineering campaigns.
Fake Package Delivery Scam Explained and Prevention
In-depth analysis of the fake package delivery scam, a widespread smishing and phishing fraud impersonating courier services to steal credentials, payment data, and personal information.
Uber Security Breach — Internal Systems Compromised Through Social Engineering Attack
Technical analysis of the 2022 Uber breach in which an attacker gained access to internal systems after compromising employee credentials through social engineering techniques.
Scattered Spider Threat Actor — Social Engineering and Enterprise Intrusion Campaigns
Technical profile of the Scattered Spider threat actor, a cybercrime group known for social engineering operations and targeted intrusions against enterprise organizations.
Fake Job Offer Scam: Recruitment Fraud Explained
Technical analysis of fake job offer scams used to steal personal data, credentials, and payments through fraudulent recruitment messages and impersonated hiring processes.
Task Scam: How Online Task Fraud Works
Investigative breakdown of task scams, a fast-growing recruitment fraud where attackers promise earnings for simple online tasks but ultimately extract deposits, payments, and personal data.
Crypto Giveaway Scam: Fake Bitcoin Promotions Explained
Investigative analysis of cryptocurrency giveaway scams where attackers impersonate celebrities, companies, or influencers and promise to double cryptocurrency transfers.
Crypto Investment Scam: How Fraud Platforms Trap Victims
Investigative analysis of cryptocurrency investment scams, explaining how fraudulent trading platforms manipulate victims through social engineering, fake dashboards, and withdrawal traps.
Invoice Scam: How Fake Billing Fraud Targets Businesses
Investigative analysis of invoice scams where attackers send fraudulent billing requests or manipulate supplier payments to redirect funds to criminal accounts.
Gift Card Scam: How Fraudsters Steal Digital Funds
Investigative analysis of gift card scams where attackers pressure victims into purchasing prepaid cards and revealing the redemption codes to transfer funds instantly.
Online Marketplace Scam: Fake Buyers and Sellers
Detailed analysis of online marketplace scams where attackers manipulate buyers or sellers on platforms like Facebook Marketplace and eBay to steal money or goods.
Refund Scam: How Fake Refund Fraud Works
Investigative analysis of refund scams where attackers claim victims are owed money and manipulate them into sending funds or granting remote access.
Rental Scam: How Fake Property Listings Steal Deposits
Investigative analysis of rental scams where attackers post fake apartment listings and pressure victims to send deposits before viewing the property.
Romance Scam: How Online Dating Fraud Works
Detailed analysis of romance scams, explaining how attackers manipulate victims through emotional relationships before extracting money, cryptocurrency, or sensitive information.
Impersonation Scam: How Attackers Pretend to Be Trusted
Investigative analysis of impersonation scams where attackers pose as trusted individuals or organizations to manipulate victims into sending money or revealing sensitive information.
Loan Scam: How Advance Fee Loan Fraud Works
Detailed analysis of loan scams where attackers promise guaranteed loans and request upfront fees or sensitive information before funds are supposedly released.
Charity Scam: How Fake Donations Steal Money
Detailed analysis of charity scams where attackers impersonate humanitarian organizations and disaster relief campaigns to collect fraudulent donations.
Social Engineering — Human Manipulation in Cyber Attacks
Social engineering refers to manipulation techniques used by attackers to trick individuals into revealing sensitive information, granting access, or performing actions that compromise security.
Lottery Scam: Fake Prize Notifications Explained
Investigative analysis of lottery scams where attackers claim victims have won prizes and demand fees or personal information to release the winnings.
User Execution — Attacks Requiring User Interaction
User execution is an attack technique where malicious actions occur after a victim opens a file, runs a program, or clicks a link that triggers malware execution.
Digital Footprint: Online Data Exposure Explained
In-depth explanation of digital footprints, how personal data accumulates online, the security risks created by online exposure, and how attackers exploit publicly available information.
How to Detect Phishing Attacks — Identifying Fraudulent Emails, Messages, and Login Pages
Practical guide explaining how to recognize phishing attacks, analyze suspicious emails, identify fraudulent login pages, and reduce the risk of credential theft and account compromise.
Why Phishing Attacks Still Succeed in Modern Networks
Analytical research explaining why phishing attacks remain one of the most successful intrusion methods despite modern security controls, examining human behavior, attacker infrastructure, and credential harvesting ecosystems.
Phishing Attack Technique — Credential Theft and Initial Access Method
Technical explanation of phishing, a social engineering attack technique used to trick users into revealing credentials or executing malicious content.