top of page

Social Engineering in 2025


Layers of Security Provide Defense In Depth

Social engineering - the age-old method of psychological manipulation used by criminals - has evolved. Attacks have become more sophisticated driven by advancements in artificial intelligence (AI) and other technologies. While social engineers continue to rely on human behavior to succeed, they are exploiting trust in new and innovative ways.


Pretexting, the fictional framework of information used to manipulate someone, has become even more effective thanks to technological advancements. How so?


  • Research is required to assemble credible details for the pretext scenario behind a social engineering attack. AI has transformed comprehensive data collection and analysis through natural language processing and real-time information retrieval. This makes it much easier to assemble believable personas making requests or craft demands using actual account or personal information.


  • Pretexting focuses on establishing rapport and “trust” over time. Innovative social engineers are using multiple channels (email, text and phone) to connect with victims and create a believable scenario behind the scam. Deepfake technology has made pretext communications using an impersonating voice very believable.


Common pretexts used in social engineering include:

  • Impersonating an authority figure

  • HR, payroll or technical support scams

  • Emergency scenarios


Pretexting is just one element of social engineering. This year, phishing, voice phishing (vishing) and ploys for long-term financial fraud will be on the rise. Stay alert to stay ahead of social engineers.



bottom of page