Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

5 minutes with Otavio Freire – How 'soft attacks' are exploiting human connection

By Maria Henriquez
5 mins with Otavio Freire
October 21, 2020

Attacks within digital communications channels (like Slack, TEAMS, Twitter, Facebook, LinkedIn)  have grown more targeted, more social engineering-focused, and the payloads have become "softer,” and the risks are not in files and links/IP's alone anymore. Instead, recent attacks are laser-targeted and evade traditional detection by focusing on human connections.

To find out more about these “soft attacks,” we talk to Otavio Freire. As the President, Chief Technology Officer and Co-Founder of SafeGuard Cyber, Freire is responsible for the development and continuous innovation of SafeGuard Cyber’s enterprise platform.

Freire has extensive experience in company strategy and engineering for cyber and risk-based scalable platforms, including social media applications, internet commerce and information technology serving the pharmaceutical, financial services, high-tech and government verticals. He has a BS in Civil Engineering, an MS in Management Information Systems and an MBA from the University of Virginia Darden School of Business, where he currently serves as a visiting executive lecturer.

 

Security magazine: Can you explain what “soft attacks” are, and how they evade traditional detection by focusing on human connections?

Freire: At a high level, we’ve been seeing attacks in digital channels have grown more targeted, more social engineering-focused, and the payloads have become "softer." By "softer," we mean that the risks are not in files or links alone anymore. Instead, recent attacks are laser-targeted and evade traditional detection by focusing on human connections and language. Attackers are now moving beyond mass-phishing and malicious payload blasts. Instead, they’re researching targets in social channels, like LinkedIn, before sending socially engineered messages. Issues of data loss, payroll fraud, account takeover, vendor invoice fraud, blackmail, credential phishing are other examples of types of "soft" attacks that take place in all digital channels for example: WhatsApp, DMs in social media, in Teams, Zoom etc. to name just a few.

 

Security magazine: Why are attackers moving beyond mass-phishing and malicious payloads blasts, and are researching their targets on social media channels before sending socially engineered message?

Freire: Attackers have realized that mass attacks have a low conversion rate, and that targeted spear-fishing however more time-intensive, has a much higher success rate. Traditional security defenses also simply do not detect and stop these attacks. From a cybercriminal’s point of view, spear phishing is the perfect means to deliver a broad array of damaging exploits. For example, threat actors are increasingly targeting VIP/executives and other high-level employees - also known as MAPs (most-attacked persons) - tricking them into activating malware that grants access to their companies’ environments.

These exploits might be ransomware that encrypts company data, then extorts fees from the victim to remediate the situation, or attacks that are focused on cyber-espionage, where the attacker moves laterally to avoid detection, seeking to gain long-term intelligence from those executives. For example, drug trials information, earnings, manufacturing contracts, etc.

 

Security magazine: What are some recent examples of these attacks?

Freire: We saw examples of these tactics in Operation Sharpshooter and more recently with the North Korean threat actor, Labyrinth Chollima which has been doing recon on targets and reaching out on LinkedIn. They then lure targets to WhatsApp, where they deliver attachments with malware. According to the FBI, over $26 billion is lost to business email compromise (BEC) alone every year, and this takes place in all channels, not just email, so perhaps the term needs to evolve.

 

Security magazine: How can security team leaders protect against these attacks? What are a few steps they can take?

Freire: It’s not easy, and it's hard for a human to comprehend and identify spearfishing by themselves, with all the deception techniques that are deployed alongside a social engineering campaign. We’ve heard of even Chief Information Security Officers getting compromised with fake keynote solicitations within 12 minutes of a red teaming exercise! That said, we recommend employees and executives pay close attention to the following elements of the communication. Does the communication:

  • Convey a sense of urgency or secrecy?
  • Use an element of authority to ask you to conduct an action?
  • Deem itself as “private”?
  • Contain unusual misspellings?
  • Relate to financial transactions?
  • Have URLs containing an IP address?
  • Contain disparities between “href” attributes and the link text?
  • Contain mentions of “Link,” “Click,” or “Here” in a text link?
  • Contain Javascript?

This is just a partial list and that is why we have built machine learning and natural-language processing into our risk analytics engine, because these phishing communications change over time. We need to be able to identify them quickly and take action before any harm is done.

KEYWORDS: cyber security hacker risk management social engineering social media security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with

    5 minutes with Carolyn Crandall – Detecting and preventing insider threat attacks

    See More
  • 5 mins with Patrick

    5 minutes with Kory Patrick - How COVID-19 challenged security practices

    See More
  • 5 mins with julian waits

    5 minutes with Julian Waits - How Security Operations Center leaders can create a culture of growth

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • June 6, 2012

    Basic Remote Connection for AXIS Camera Companion

    In this webinar, you will learn how to setup basic forwarding rules and Network address translation (NAT) in a router. We will also show you how to setup remote connection using AXIS Camera Companion.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing