{"id":20209,"date":"2022-02-03T10:35:36","date_gmt":"2022-02-03T10:35:36","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=20209"},"modified":"2025-06-26T20:45:08","modified_gmt":"2025-06-26T20:45:08","slug":"social-engineering-trends-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/","title":{"rendered":"Social Engineering Trends in Cybersecurity"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">Cyberthreats continue to be a rising security issue, with different attack vectors popping up as each day passes. Most cybercriminals rely on social engineering tactics for execution because it preys on human desire, curiosity, fear, and urgency.&nbsp;<\/span><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><span style=\"font-weight: 400;\">&nbsp;<\/span>\u201cCybercriminals are developing and enhancing their attacks at an upsetting rate, exploiting the uncertainty and fear caused by shaky economic and social circumstances.\u201d<span style=\"font-weight: 400;\">&nbsp;<\/span><\/p>\n<cite>Jurgen Stock | Interpol Secretary-General<\/cite><\/blockquote>\n\n\n\n<p><span style=\"font-weight: 400;\">With that, cybersecurity professionals need to adapt to these evolving <\/span><b><a href=\"https:\/\/easydmarc.com\/blog\/social-engineering-a-complete-guide\/\">social engineering<\/a> trends <\/b><span style=\"font-weight: 400;\">to protect their infrastructure and systems.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">During the COVID-19 pandemic, most organizations experienced a rise in phishing attacks. Some cybercriminals even <\/span><a href=\"https:\/\/www.who.int\/about\/cyber-security\"><span style=\"font-weight: 400;\">pose as World Health Organization<\/span><\/a><span style=\"font-weight: 400;\"> agents to lure people into divulging sensitive information.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">In 2020, phishing attacks rose 220% at the height of the COVID-19 pandemic. According to CBS News, 36% of successful corporate attacks involved phishing, indicating an 11% rise over the past year.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Let\u2019s take a closer look at <\/span><b>top cybersecurity trends for 2022<\/b><span style=\"font-weight: 400;\">.&nbsp;<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-deep-fakes-are-a-deep-seated-concern\">Deep Fakes are a Deep-Seated Concern<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">The evolution of modern technology has brought about various innovations, and one, in particular, is causing an uproar in the cyberworld: Deep Fakes. It\u2019s one of the <\/span><b>top trends in cybersecurity 2022<\/b><span style=\"font-weight: 400;\">. Deepfake uses AI technology to create fake videos, images, or audio recordings of real people.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Deepfake is highly convincing, and its advancement can make it difficult to distinguish between fake and real content. While deepfake is still a new trend in artificial intelligence (AI), both individuals and organizations should be careful as it can play a vital role in emerging cybercrime and fraud trends.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Attackers can use deepfake tech to create fake videos of top government officials, spread misinformation, encourage hatred, and manipulate sentiments. In 2020, the cost of a deepfake attack was <\/span><a href=\"https:\/\/www.iproov.com\/wp-content\/uploads\/2021\/05\/iProov-Deepfakes-Report.pdf\"><span style=\"font-weight: 400;\">estimated to be around $250 million<\/span><\/a><span style=\"font-weight: 400;\">, while the technology is still in its infancy.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">There\u2019s no denying that as deepfake tech evolves, cybercriminals will find advanced ways to use it against individuals and organizations.&nbsp;&nbsp;<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-phishing-as-a-service-paas-ups-the-ante\">Phishing-as-a-Service (PaaS) Ups the Ante<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">From clicking malicious links to downloading email attachments, phishing is one of the most widely used social engineering tactics. As cybersecurity advances, attackers devise more sophisticated ways to execute their phishing attacks.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Phishing-as-a-Service is among the new <\/span><b>cybersecurity industry trends<\/b><span style=\"font-weight: 400;\"> experienced social engineering attackers use to compromise organizations\u2019 networks. Cybercriminals can now rent or buy phishing kits or tools to steal credentials and other confidential data.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Cyberactors can get phishing kits for as low as $20, while top-end solutions are worth around $200. Amassing popularity, the sale of <\/span><a href=\"https:\/\/www.helpnetsecurity.com\/2020\/04\/16\/phishing-kits-market\/\"><span style=\"font-weight: 400;\">phishing kits became more expensive, around $120 in 2019<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">In October 2021, Microsoft published an investigation into the BulletProofLink PaaS that exploited over 300,000 sub-domains in a single campaign.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">2021 saw the uncovering of a <\/span><a href=\"https:\/\/threatpost.com\/logokit-simplifies-office-365-sharepoint-login-phishing-pages\/163430\/\"><span style=\"font-weight: 400;\">new phishing kit<\/span><\/a><span style=\"font-weight: 400;\">, known as LogoKit, which automatically pulls the victim\u2019s logo onto the malicious login page. This new kit was detected on at least 700 domains, which mimics and targets services, ranging from Adobe Document Cloud and SharePoint to Office 365 OneDrive, and many others.&nbsp;<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-government-sponsored-social-engineering-continues\">Government-Sponsored Social Engineering Continues<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Digital infrastructure is an integral part of a nation\u2019s daily operations, so rogue nations are raising the stakes in cyberwarfare. This type of attack promotes a nation\u2019s interest both home and abroad. The attack could range from crashing a state\u2019s website to sabotaging the financial system of a country.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Microsoft reportedly sent 13,000 notifications warning account holders of government-sponsored attacks between July 2019 and June 2020. This was the same tactic reportedly used by Russian hackers to hack and leak emails from the Democratic National Convention to destroy former American presidential candidate; Hillary Clinton.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Government-backed hacking is also used in modern warfare. In addition to the real-life battles between armies, cyberspace battles between nations are also common.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-phishing-holds-its-ground\">Phishing Holds Its Ground<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Even with the emergence of new threats, phishing continues to be one of the most-used tactics by attackers to compromise systems. The COVID-19 pandemic resulted in an increase in phishing attacks for many reasons. These include the decrease of alertness in people working from home, exploiting virus fears, and vaccine-related scams. There are specific types of phishing we predict will become particularly potent in 2022.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-consent-phishing\">Consent Phishing<\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Consent phishing is a social engineering technique that uses malicious apps to seek users\u2019 permission to access organization network resources. These malicious apps don&#8217;t need to run a code on the user\u2019s device, so it\u2019s easy to bypass endpoint security.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The <\/span><span style=\"font-weight: 400;\">attack on SANS Institute<\/span><span style=\"font-weight: 400;\"> in August 2020 is an excellent example of consent phishing. It resulted in the leakage of around 28,000 Personally Identifiable Information (PII) records. A malicious Office 365 add-on caused a staff email account to automatically forward emails to an attacker\u2019s email address.&nbsp;<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-angler-phishing\">Angler Phishing<\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Another phishing trend that organizations need to watch out for in 2022 is <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-angler-phishing-and-how-can-you-avoid-it\/\"><span style=\"font-weight: 400;\">angler phishing<\/span><\/a><span style=\"font-weight: 400;\">. It involves contacting people on social media while posing as a company\u2019s customer service agent. The fact that people seek help on social media makes this attack effective in luring users to divulge their credentials.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">With social media use on the rise, organizations should expect an increase in angler phishing attacks in 2022. Cyberattackers employ these tactics due to their effectiveness. They create fake accounts of a company\u2019s customer support then wait for customers to ask for help.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-higher-education-institutions-secure-their-infrastructure\">Higher Education Institutions Secure Their Infrastructure<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Higher education has been and will continue to be an appealing target to cybercriminals in 2022. <\/span><b>Cybersecurity trends in higher education<\/b><span style=\"font-weight: 400;\"> include <\/span><a href=\"https:\/\/easydmarc.com\/solutions\/dmarc-educational-organizations\"><span style=\"font-weight: 400;\">email security protocol adoption<\/span><\/a><span style=\"font-weight: 400;\">. More and more institutions realize the importance of SPF, DKIM, and DMARC in securing a large amount of Personal Identifiable Information (PII), research information, and medical records they store and work with.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">According to Microsoft Security Intelligence, the <\/span><a href=\"https:\/\/easydmarc.com\/solutions\/dmarc-educational-organizations\"><span style=\"font-weight: 400;\">educational sector<\/span><\/a><span style=\"font-weight: 400;\"> experienced <\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\"><span style=\"font-weight: 400;\">more malware encounters than any other industry<\/span><\/a><span style=\"font-weight: 400;\"> in the past 30 days alone. A 2021 survey carried out by Campus Technology claims that institutions that suffered cyberattacks spent an average of $366,000 for recovery. The survey also claimed that a third of these institutions spent a month or more to identify, deal with, and recover from the attack.\u00a0<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-attackers-target-managed-service-providers-msps\">Attackers Target Managed Service Providers (MSPs)<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">MSPs always have access to their customers\u2019 network and systems. In this case, MSPs require the use of Remote Monitoring and Management (RMM) tools to access, manage, and control their customers\u2019 networks remotely. Attackers can exploit these RMM tools for malicious remote access from a compromised MSP environment.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">MSPs have a lot of clients from various industries, and targeting them is more valuable for hackers. Attackers only need to target one MSP, but can reap the benefit of accessing information and digital assets of many business entities. For instance, if an MSP is held to ransom, the attacker can demand a huge payment from the MSP or small payments from each affected customer.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Managed service providers must have <\/span><a href=\"https:\/\/easydmarc.com\/solutions\/dmarc-managed-service-providers\"><span style=\"font-weight: 400;\">potent security systems<\/span><\/a><span style=\"font-weight: 400;\"> to protect client data. For example, if the MSP fails to protect their infrastructure from phishing and spoofing via email security protocols (SPF, DKIM, and DMARC), the clients might experience phishing and spoofing attacks, spam flows, ransomware, and other dire outcomes.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-business-email-compromise-bec-gets-expensive\">Business Email Compromise (BEC) Gets Expensive<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">According to the Federal Bureau of Investigation (FBI), Business Email Compromise is one of the most financially damaging online crimes. This attack leverages the fact that an organization depends on email to conduct business. Attackers impersonate legitimate business contacts to lure targets into transferring funds or granting access to sensitive company resources.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">A <\/span><a href=\"https:\/\/www.proofpoint.com\/uk\/blog\/security-awareness-training\/new-ponemon-study-finds-annual-cost-phishing-scams-has-more-tripled#:~:text=BEC%20is%20a%20security%20exploit,for%20BEC%20is%20%245.96%20million.\"><span style=\"font-weight: 400;\">2021 Ponemon study<\/span><\/a><span style=\"font-weight: 400;\"> reported that the average yearly cost of BEC phishing is $5.56 million. If it involves business leaders, the potential cost is estimated to be over $150 million.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Even if the risk doesn\u2019t get top-level executive attention, the average total amount paid to BEC cybercriminals yearly is around $1.17 million. According to Gartner, BEC attacks will continue to double yearly through 2023, with a shocking average cost of $5 million to its victims.&nbsp;<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cryptocurrency-and-social-engineering-go-hand-in-hand-nbsp\">Cryptocurrency and Social Engineering Go Hand in Hand&nbsp;<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">The cryptocurrency world has experienced a boom since the introduction of Bitcoin in 2008. Now, 1 BTC is valued at over $41,000 (it also certainly grew while editing this article). The excitement that cryptocurrency markets can generate massive profits has attracted newbies to the space in an extremely short period.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Even those who don\u2019t understand how the market works end up investing without in-depth research. Social engineering takes advantage of people\u2019s fear, half-knowledge, and greed to make quick money. This eventually leads aspiring crypto investors to chase fake promises through airdrops and giveaways. In 2021, cybercriminals took away <\/span><span style=\"font-weight: 400;\">$14 billion in cryptocurrency<\/span><span style=\"font-weight: 400;\">, and 2022 is going to see a growing trend in this sphere too.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-final-thoughts\">Final Thoughts<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">As technology advances, attackers leverage the latest and greatest trends to make their social engineering tactics more convincing. Organizations must stay up-to-date with digital and <\/span><b>social engineering protection trends<\/b><span style=\"font-weight: 400;\"> so they can employ the best security practices to counter new attack types and methods.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">It\u2019s imperative to educate your employees on the social engineering tactics used by attackers to compromise network systems. Install sophisticated antivirus solutions on your networks, employ the latest email security protocols, and keep them updated at all times.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberthreats continue to be a rising security issue, &#8230;<\/p>\n","protected":false},"author":5,"featured_media":20211,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199,289],"tags":[],"class_list":["post-20209","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Social Engineering Trends in Cybersecurity | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Cybersecurity evolves with the development of technology and social engineering trends change every year. Let&#039;s dive into 2022 predictions!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering Trends in Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity evolves with the development of technology and social engineering trends change every year. Let&#039;s dive into 2022 predictions!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-03T10:35:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T20:45:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/24.01-8.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hasmik Khachunts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hasmik Khachunts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/\"},\"author\":{\"name\":\"Hasmik Khachunts\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\"},\"headline\":\"Social Engineering Trends in Cybersecurity\",\"datePublished\":\"2022-02-03T10:35:36+00:00\",\"dateModified\":\"2025-06-26T20:45:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/\"},\"wordCount\":1509,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/24.01-8.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/\",\"name\":\"Social Engineering Trends in Cybersecurity | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/24.01-8.jpg\",\"datePublished\":\"2022-02-03T10:35:36+00:00\",\"dateModified\":\"2025-06-26T20:45:08+00:00\",\"description\":\"Cybersecurity evolves with the development of technology and social engineering trends change every year. Let's dive into 2022 predictions!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/24.01-8.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/24.01-8.jpg\",\"width\":1440,\"height\":910,\"caption\":\"24.01 8\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/social-engineering-trends-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Social Engineering Trends in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\",\"name\":\"Hasmik Khachunts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"caption\":\"Hasmik Khachunts\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/hasmik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Social Engineering Trends in Cybersecurity | EasyDMARC","description":"Cybersecurity evolves with the development of technology and social engineering trends change every year. Let's dive into 2022 predictions!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Social Engineering Trends in Cybersecurity","og_description":"Cybersecurity evolves with the development of technology and social engineering trends change every year. Let's dive into 2022 predictions!","og_url":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-02-03T10:35:36+00:00","article_modified_time":"2025-06-26T20:45:08+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/24.01-8.jpg","type":"image\/jpeg"}],"author":"Hasmik Khachunts","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Hasmik Khachunts","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/"},"author":{"name":"Hasmik Khachunts","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c"},"headline":"Social Engineering Trends in Cybersecurity","datePublished":"2022-02-03T10:35:36+00:00","dateModified":"2025-06-26T20:45:08+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/"},"wordCount":1509,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/24.01-8.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/","url":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/","name":"Social Engineering Trends in Cybersecurity | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/24.01-8.jpg","datePublished":"2022-02-03T10:35:36+00:00","dateModified":"2025-06-26T20:45:08+00:00","description":"Cybersecurity evolves with the development of technology and social engineering trends change every year. Let's dive into 2022 predictions!","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/24.01-8.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/24.01-8.jpg","width":1440,"height":910,"caption":"24.01 8"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/social-engineering-trends-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"Social Engineering Trends in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c","name":"Hasmik Khachunts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","caption":"Hasmik Khachunts"},"url":"https:\/\/easydmarc.com\/blog\/author\/hasmik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/24.01-8.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/20209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=20209"}],"version-history":[{"count":3,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/20209\/revisions"}],"predecessor-version":[{"id":48949,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/20209\/revisions\/48949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/20211"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=20209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=20209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=20209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}