Social media as a weapon


The research focus was given on the use of Social media in the offensive process. Indeed, from the reconnaissance stage to the benefits of the attacks, threat actors actively use different social platforms for social and technical engineering. This duality proves the socio-technical character of cyber attacks.

  1. Introduction
  2. Reconnaissance: selection and psychological leverages intel
  3. Intrusion: delivery and installation
  4. Pursue and refine the attack
  5. Selling and sharing: post-attack benefits

Cybers Security Week is required by law to ask permission for using cookies. We use functional cookies, and cookies for managing website statistics.
The cookies are processed anonimously. By continuing on our website, you accept the use of cookies.
Read our privacy and cookie policy for more information.