{"id":3393,"date":"2025-02-07T12:32:58","date_gmt":"2025-02-07T12:32:58","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/02\/07\/ai-powered-social-engineering-reinvented-threats\/"},"modified":"2025-02-07T12:32:58","modified_gmt":"2025-02-07T12:32:58","slug":"ai-powered-social-engineering-reinvented-threats","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/02\/07\/ai-powered-social-engineering-reinvented-threats\/","title":{"rendered":"AI-Powered Social Engineering: Reinvented Threats"},"content":{"rendered":"<p>\u200bThe foundations for social engineering attacks \u2013 manipulating humans \u2013 might not have changed much over the years. It\u2019s the vectors \u2013 how these techniques are deployed \u2013 that are evolving. And like most industries these days, AI is accelerating its evolution.\u00a0<br \/>\nThis article explores how these changes are impacting business, and how cybersecurity leaders can respond.<br \/>\nImpersonation attacks:\u00a0The foundations for social engineering attacks \u2013 manipulating humans \u2013 might not have changed much over the years. It\u2019s the vectors \u2013 how these techniques are deployed \u2013 that are evolving. And like most industries these days, AI is accelerating its evolution.\u00a0<br \/>\nThis article explores how these changes are impacting business, and how cybersecurity leaders can respond.<br \/>\nImpersonation attacks:\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe foundations for social engineering attacks \u2013 manipulating humans \u2013 might not have changed much over the years. It\u2019s the vectors \u2013 how these techniques are deployed \u2013 that are evolving. And like most industries these days, AI is accelerating its evolution.\u00a0 This article explores how these changes are impacting business, and how cybersecurity leaders&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/02\/07\/ai-powered-social-engineering-reinvented-threats\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">AI-Powered Social Engineering: Reinvented Threats<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":3394,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/3393"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=3393"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/3393\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/3394"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=3393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=3393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=3393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}