Phishing (the most common entry point)
Human vulnerability exploited: Trust in familiar senders; urgency
Phishing is the most prevalent form of social engineering and the most common entry point for breaches. Attackers send deceptive emails, SMS messages, or social media communications designed to look like they're from a trusted source: your bank, your cloud provider, your CEO. The goal is to get you to click a malicious link, download an infected attachment, or hand over your credentials.
What makes phishing so effective is its scale. One convincing fake login page can harvest hundreds of credentials before anyone notices. And AI has dramatically raised the quality bar. Modern phishing emails are grammatically polished, brand-accurate, and tailored to individual targets in ways that were impossible just a few years ago.
Phishing ranges from broad spray-and-pray campaigns to highly targeted spear phishing attacks that reference your name, role, or recent activity. The more personalized the lure, the harder it is to catch.
Business email compromise (BEC) and identity theft
Human vulnerability exploited: Authority; assumed identity of trusted colleagues or executives
Business email compromise is a sophisticated, targeted form of phishing where attackers impersonate executives, vendors, or colleagues to authorize fraudulent wire transfers, redirect payroll, or extract sensitive data. Unlike generic phishing, BEC attacks are carefully researched and often involve monitoring email accounts for weeks before striking.
The results are devastating. According to the Huntress 2026 Cyber Threat Report, logins with a suspicious footprint make up 37% of all identity threats across more than 9 million identities we protect — many of which are precursors to business email compromise (BEC) and other high-impact account takeover attacks.
BEC is closely linked to identity theft: once an attacker gains access to a legitimate email account or Microsoft 365 identity, they can operate entirely within normal communication channels, making detection extremely difficult without identity-focused monitoring.
Pretexting
Human vulnerability exploited: Trust in authority figures; willingness to help
Pretexting involves fabricating a believable scenario — a "pretext" — to extract information from a target. The attacker poses as someone with a legitimate reason to ask: an IT technician needing your login to fix a system issue, an HR representative verifying benefits details, or an auditor requesting financial records.
What sets pretexting apart from standard phishing is the relationship-building involved. Pretexting attacks often unfold over multiple interactions, with the attacker establishing credibility before making their real request.
Pretexting is frequently the setup phase for larger attacks. Once an attacker has your credentials through a pretexting scenario, they can escalate to account takeover, BEC, or lateral movement through your systems.
Baiting
Human vulnerability exploited: Curiosity; desire for free rewards.
Baiting lures victims with something enticing: a free software download, a USB drive left in a parking lot labeled "Q3 Salary Data," or a prize notification. The goal is simple: get the target to take an action (plug something in, click something, download something) that installs malware or hands over credentials.
Physical baiting remains surprisingly effective. Studies have shown that a significant percentage of people will plug an unknown USB drive into a work computer out of pure curiosity. Digital baiting exploits the same instinct: pirated software, free media files, and "exclusive" downloads are all common delivery vehicles for malware.
The defense is cultural: employees need to understand that free always has a price, and curiosity in a work context requires a moment of skepticism before action.
Vishing and smishing (voice and SMS scams)
Human vulnerability exploited: Authority; urgency; familiarity through spoofed caller IDs.
Vishing (voice phishing) and smishing (SMS phishing) bring social engineering off the screen and into real-time conversation, which makes them particularly powerful. A caller claiming to be from your bank, your IT department, or even your own organization can create immediate pressure that an email simply can't replicate.
AI voice cloning has taken this threat to a new level. Attackers can now generate convincing real-time audio impersonating executives, family members, or known colleagues using just a few seconds of publicly available voice data. The U.S. Department of Health and Human Services has specifically warned organizations that attackers are calling IT help desks, posing as employees, claiming their devices are broken, and requesting new device enrollments that hand over administrative access.
Smishing follows the same playbook via text message — a spoofed link from "your carrier" or "your bank" that looks legitimate on a small screen and under time pressure.
Quid pro quo
Human vulnerability exploited: Reciprocity; desire to receive help in exchange for cooperation.
Quid pro quo attacks offer something in return for sensitive information. The classic version: an attacker calls random employees posing as IT support, offering to help fix a problem in exchange for their login credentials. Because the attacker is presenting themselves as helpful, not threatening, targets are often disarmed.
Unlike baiting, which dangles a one-way reward, quid pro quo is built on an implied exchange. The target feels they're getting something of value (technical help, a service, information) in return for providing access. That reciprocity instinct is deeply wired in humans, which is what makes it an effective social engineering lever.
Tailgating and piggybacking (physical security)
Human vulnerability exploited: Social politeness; reluctance to challenge strangers.
Not all social engineering happens digitally. Tailgating occurs when an unauthorized person follows an employee through a secure door without their knowledge, relying on the fact that most people hold doors open out of politeness. Piggybacking is similar, except the authorized employee knowingly (but mistakenly) allows the attacker in, perhaps believing they're a contractor or visitor.
Once inside a secure facility, an attacker can install physical keyloggers, access unattended workstations, or plant network implants. Physical entry is a gateway to digital compromise — and it's often completely invisible to endpoint and identity monitoring tools.
Security training programs that focus exclusively on digital threats overlook a vulnerability that exists in every office building and server room.
Whaling (targeting executives)
Human vulnerability exploited: Authority; high-stakes urgency; OSINT-fueled personalization.
Whaling is spear phishing aimed specifically at C-suite leaders and senior executives, the highest-value targets in any organization. Executives have access to financial systems, sensitive strategic data, and the authority to approve large transactions, which makes compromising them extraordinarily valuable to an attacker.
Whaling attacks also tend to move fast: once an executive's account or credentials are compromised, attackers pivot quickly to authorize fraudulent transfers or access board-level communications before anyone notices.
Honeytraps
Human vulnerability exploited: Romantic interest; desire for connection; trust built over time.
Honeytraps, or romance scams, involve an attacker creating a fake romantic or professional persona typically on LinkedIn, social media, or dating platforms, to build trust with a target and then extract information, solicit sensitive data, or manipulate them into taking harmful actions.
These are long-game attacks, often used in corporate espionage scenarios where the payoff justifies weeks or months of relationship-building. A fake recruiter who gains access to an employee's professional network, earns their confidence, and asks them to "review a file" is executing a honeytrap. So is the romantic connection who, over weeks of conversation, subtly probes for details about internal systems, access credentials, or organizational structure.
Honeytraps are particularly difficult to detect because the victim genuinely trusts the attacker — often until the damage is already done.
Watering hole attacks
Human vulnerability exploited: Trust in familiar, routinely visited websites.
In a watering hole attack, the attacker doesn't come to the victim, they wait where the victim already goes. By compromising a website that a specific organization's employees regularly visit (an industry forum, a supplier's portal, a trade publication), the attacker delivers malware to targets who are doing nothing unusual. They're simply visiting a site they trust.
What makes watering hole attacks particularly insidious is their stealth. The victim doesn't click a suspicious link or open an unknown attachment; they visit a known, trusted site and get infected in the process. Standard email security controls don't catch this. It requires endpoint monitoring and behavioral detection to identify the infection after the fact.
Watering hole attacks underscore a critical point: even well-trained employees who do everything right can be compromised. That's why monitoring doesn't stop at the inbox.