A Phishing Trip - The Constant Evolution of Social Engineering Attacks
Release Date: 03/25/2025
Shut The Backdoor
“Good security habits should reduce stress, not add to it.” Notable Moments [0:00–2:17] Holiday phishing scams and why “too good to be true” usually is [2:33–3:53] AI voice cloning and the rise of deepfake phone scams [4:06–5:20] Personal vs. work data and accidental cloud uploads [5:35–7:05] Shoulder surfing risks and protecting your screen in public [7:23–9:26] Public Wi-Fi safety, fake networks and VPN realities [9:44–10:52] Password managers and eliminating risky password habits [11:12–12:34] Passphrases, XKCD wisdom and stronger password strategy [12:52–13:25]...
info_outlineShut The Backdoor
“Third parties are a common entry point for cyber attacks. This is something you really want to make sure you have under control.” Notable Moments [00:01:15] Third-party due diligence and security reviews. [00:03:25] How regulatory requirements like HIPAA, PCI DSS, GDPR shape due diligence. [00:05:28] Ongoing monitoring and review expectations. [00:06:19] Physical access risks: background checks for on-site vendor personnel. [00:07:44] Company’s responsibility to vet vendors, especially as AI evolves. [00:09:42] What documentation to request and how to evaluate red flags. [00:12:27]...
info_outlineShut The Backdoor
“Cybersecurity is a shared responsibility. One organization’s defense can strengthen an entire community.” Notable Moments 00:01:00 – What an ISAC is and how it began 00:02:40 – How Health ISAC has grown globally 00:04:44 – Top threats facing healthcare today 00:09:25 – AI’s role in both defense and attacks 00:13:45 – Impact of the Cybersecurity Information Sharing Act 00:18:03 – Why information sharing builds community trust 00:19:28 – Government collaboration challenges 00:23:49 – Final proactive cybersecurity advice Errol Weiss, Chief Security Officer of Health...
info_outlineShut The Backdoor
“We’re not trying to avoid AI because of the scary security issues; we’re trying to deploy it securely so we can unlock its true potential.” Notable Moments 01:09 – Rene Brandel on why he began hacking Y Combinator AI agents to find security gaps. 02:30 – How quickly AI systems can be breached without strong security oversight. 03:51 – The risk of cross-user data access and violating HIPAA’s minimum necessary standard. 07:05 – Understanding permissions creep and why AI agents should be treated like individual users. 10:23 – How malicious actors can use code execution...
info_outlineShut The Backdoor
“There aren’t that many things that really are impossible. We just have to set aside boundaries and figure out how to make them real.” Episode Highlights [02:53] Bob on managing creativity and building environments where big ideas thrive [05:27] Disney embedding safety and security into their culture [10:20] Brainstorming approach for tackling “impossible” challenges [17:03] Balancing creativity and connection in remote work [28:25] Cross-disciplinary collaboration sparking new ideas [31:09] Tackling massive projects with limited resources [46:48] Internal marketing to gain buy-in...
info_outlineShut The Backdoor
"If we can scale AI for better use, it can make the world a better place rather than just your daily personal life." Notable Moments: [01:27] Marina explains her AI project with indigenous communities in New Zealand [03:26] Researching AI responses in abortion counseling [07:43] Ten weeks in Namibia studying environmental science and conservation [10:46] Using machine learning to study tree pod dynamics and herbivore consumption [12:24] Expanding AI research into plant growth and climate variability [13:25] Marina’s perspective on scaling AI to make the world better In this bonus episode,...
info_outlineShut The Backdoor
"DEF CON is one of those places where you walk in expecting to learn one thing and walk out realizing the possibilities are far greater than you imagined." Notable Moments [02:24] – Trevor explains what DEF CON is and why it’s unique. [04:36] – The rise of inclusivity and community groups like WISP and Diana Initiative. [06:55] – Villages and Capture the Flag competitions explained. [09:22] – A boat inside the Maritime Hacking Village surprises attendees. [10:32] – The AI Cyber Challenge: DARPA and ARPA-H host a $4M competition. [15:23] – Kubernetes workshops bring practical,...
info_outlineShut The Backdoor
"Hospitals don’t just store data. They safeguard stories, care plans, and lives. When ransomware hits, it’s not just a system crash, it’s a trust collapse." Notable Moments 00:01:10 – What ransomware is and how it's evolved 00:04:15 – How the Colonial Pipeline and Vegas attacks sparked Jeffrey’s interest 00:07:10 – Why healthcare is a prime target 00:10:00 – How Jeffrey built a ransomware database of 800+ healthcare entities 00:16:00 – Rise of ransomware-as-a-service (RaaS) and competition between threat actors 00:20:20 – Most targeted entities: hospitals, clinics,...
info_outlineShut The Backdoor
"Security isn’t proprietary. Sharing what works makes us all safer." Notable Moments 01:29 – Rise in ransomware and the case for collaboration 03:41 – Why reinvention puts you at risk 05:12 – The danger of building relationships mid-crisis 08:10 – Balancing information sharing and confidentiality 09:26 – How groups like HISAC facilitate secure collaboration 12:24 – Learning from incidents you haven’t experienced 18:06 – Building networks at all levels, not just CISOs 21:46 – Advice for making the first outreach 23:31 – Using your current network to grow your reach With...
info_outlineShut The Backdoor
“We have to make sure AI doesn’t just automate what we've always done. It should elevate what’s possible.” Notable Moments 00:40 – What’s pushing us to talk about AI now? 04:22 – A call for AI mission statements 08:18 – When tools lead before people: the risk of reactive adoption 11:05 – Defining AI boundaries: what it should never replace 15:33 – ChatGPT, Canva, Magic School: the tools already in use 18:42 – The importance of transparency and human oversight 22:55 – Reframing AI as “instructional support,” not just automation AI isn’t something on the horizon....
info_outline"That's when it starts getting really scary. This is no longer just an email trying to get some gift cards. This stuff can lead to the bigger attacks that then can directly impact patient care."
Notable Moments
01:02 Phishing: Persistent Cybersecurity Threat
03:27 Cybersecurity’s Evolving Threats
09:15 Phishing Scams: Calls and Video
10:23 Rise of Deepfake Scams and Counterfeit Reality Attacks
15:43 Vulnerability in Healthcare as Cybersecurity Threats Escalate
21:49 MFA and Password Management Trends
24:39 Stopping Phishing with Email Security
28:24 Advanced Phishing Training Strategies
32:05 Effective Phishing Training Strategies
34:07 Ineffective Automated Training Solutions
Episode Resources
Resources
https://redoxengine.com/solutions/platform-security
Have feedback or a topic suggestion? Submit it using this linked form.
Matt Mock mmock@redoxengine.com
Meghan McLeod mmcleod@redoxengine.com
Receiving a suspicious email, a text message claiming a lottery win, or an urgent request from a "bank" are instances of a cyber menace many know as phishing. While the term might initially bring the mental image of casting a line into a tranquil lake, this type of phishing is anything but relaxing. It’s a threat lurking in our inboxes and beyond, which is why it is important to stay vigilant with the ever-evolving social engineering attacks.
Phishing has been a thorn in the side of cybersecurity for ages. The goal is to secure sensitive data like passwords or financial information or to install malicious software on a device, all under the guise of legitimate communication. The attackers attempt to capitalize on human error, exploiting the trust between people and technology. Phishing remains a top method for hackers due to its low cost and unfortunate high success rate. As Matt Mock highlights, phishing's simplicity is what makes it so dangerous.
Grammatical errors or suspicious links used to make phishing attempts easy to spot. Now AI advancements have made attacks more sophisticated by creating convincing emails clear of grammar errors. They are using voice calls, video messages, and text messages with deceptive stories that sound real while demanding quick action. Home networks have brought on new challenges as remote work blurs the lines between home and professional security.
The valuable data in healthcare makes them an irresistible target for cybercriminals. Healthcare data is rich with information that commands a high price in the black market. Attacks that compromise healthcare data can have serious repercussions, affecting both privacy and the quality of care. The need to protect healthcare data has never been more pressing.
Preparation is paramount. Improve defenses by emphasizing advanced security measures like multifactor authentication (MFA), engaging training programs, and regular phishing tests. As cybersecurity professionals at Redox, we have the tools and responsibility to educate and protect against these persistent threats. Stay vigilant so you can help others anticipate the next wave of phishing schemes. Remember, it’s not just about locking the back door; it’s about securing all entry points.