Episode 29: Social Engineering and Obfuscation Detection
Not all threats come from code—many come from people. This episode explores how attackers use social engineering tactics to bypass technical defenses, trick users, and gain footholds in environments. From phishing and pretexting to spoofed links and impersonation, we walk through the indicators that security analysts must watch for.
You’ll also learn about techniques attackers use to obscure their intent, such as obfuscated URLs, encoded payloads, and misleading domain structures. We cover how to detect these signals in user reports, logs, and alerts—and how to escalate appropriately. Understanding social vectors is key to both threat detection and security awareness efforts across the organization. Brought to you by BareMetalCyber.com
