RESOURCES
Discover a wide range of human-centric cybersecurity resources sorted by type, including blogs, downloadable documents, videos, and past webinars. These informative materials provide valuable insights into the complexities of social engineering and offer expert recommendations to help you navigate these challenges.
- Whitepapers
- Videos
- Threat Intelligence
- Target Intelligence
- On-Demand Webinars
- Customer Success Stories
- Blog
- Podcasts
![Podcast Interview – The Intersection Between Privacy, AI, and Cybersecurity](https://getpicnic.com/wp-content/uploads/2024/07/podcast-kemp-ross.webp)
If you are a GRC professional or a Cybersecurity practitioner, you will find this episode of Picnic’s Podcast Interviews very…
![Podcast Interview – Lt. General (ret.) Charles Moore, fmr. Deputy Commander, US Cyber Command](https://getpicnic.com/wp-content/uploads/2024/06/podcast-charles-moore.webp)
We are thrilled to share with you a podcast interview with Lt. General (ret.) Charles Moore, also known as “Tuna.”…
![Picnic Demo at UniCon24](https://getpicnic.com/wp-content/uploads/2024/04/demo-at-unicon.webp)
Ben Andreas, VP of Managed Services at Picnic, offers a demo of the digital risk protection services (DRPS) platform to…
![The Mother of All Breaches: What You Need to Know and How to Stay Safe](https://getpicnic.com/wp-content/uploads/2024/02/moab-1024x458-1.jpg)
In an era where digital footprints are left everywhere, the recent unveiling of “The Mother of All Breaches” has sent…
![Uniting Pre and Post-Access Threat Defense](https://getpicnic.com/wp-content/uploads/2024/02/scythe-webinar-web-1.jpg)
In this session, recorded on 02/05/2024, Picnic and Scythe joined forces to offer a perspective on prevention that spans the…
![Enhancing Security Against Social Engineering: Safeguarding Customer Interaction Centers and IT Support Teams](https://getpicnic.com/wp-content/uploads/2023/12/help-desk-1024x458-1.jpg)
Customer service centers, commonly known as call centers and IT support teams, often referred to as help desks, are becoming…
![Introduction to Picnic](https://getpicnic.com/wp-content/uploads/2023/11/presented-by-polak-1024x458-1.jpg)
If you want to learn about Picnic and how we protect the human attack surface with digital risk protection services, this…
![OGE Energy Corp](https://getpicnic.com/wp-content/uploads/2023/11/jason-nations-oge-1024x458-1.jpg)
Jason Nations is the Director of Enterprise Security at OG&E. A seasoned IT and OT security executive, Jason highlights in…
![Impersonation on LinkedIn: Recognizing the Top 10 Telltale Signs of Threat Actors](https://getpicnic.com/wp-content/uploads/2023/11/impersonation_1024x478.jpg)
LinkedIn has become an essential tool for professionals to network, share knowledge, and seek career opportunities. Yet, like any popular…
![UCLA Anderson School of Management](https://getpicnic.com/wp-content/uploads/2023/10/howard-miller-ucla-1024x458-1.jpg)
Howard Miller is the CIO at UCLA Anderson School of Management. He has been a Picnic customer for a few…
![Okta October 2023 Breach](https://getpicnic.com/wp-content/uploads/2023/10/AdobeStock_627416861_1024x478.jpg)
Download PDF Incident Name: Okta October 2023 Breach Date of Incident: 2nd – 18th October 2023 Summary: Okta, a well-known…
![23andMe October 2023 Credential Stuffing Attack](https://getpicnic.com/wp-content/uploads/2023/10/23andMe-1024x478-1.jpg)
Download PDF Incident Name: 23andMe October 2023 Credential Stuffing Attack Date of Incident: October 2nd, 2023 Summary: 23andMe is a…
![Rosen’s Diversified (RDI)](https://getpicnic.com/wp-content/uploads/2023/09/brent-baker-rdi-1024x458-1.jpg)
Brent Baker is the Executive Vice President of Information Technology at Rosen’s Diversified (RDI), a conglomerate of businesses in the…
![Protecting Against Social Engineering and Credential Stuffing](https://getpicnic.com/wp-content/uploads/2023/09/social-engineering-1024x478-1.jpg)
NIST CSF, MITRE ATT&CK, and HASP frameworks In today’s digital world, the ever-evolving landscape of cybersecurity threats poses significant challenges…
![Retool August 2023 Social Engineering Attack](https://getpicnic.com/wp-content/uploads/2023/09/smishing-1024x478-1.jpg)
Download PDF Incident Name: Retool August 2023 Social Engineering Attack Date of Incident: August 27th, 2023 Summary: Retool, a popular…
![MGM Resorts International September 2023 Ransomware Attack](https://getpicnic.com/wp-content/uploads/2023/09/mgm-1024x478-1.jpg)
Download PDF Incident Name: MGM Resorts International September 2023 Ransomware Attack Date of Incident: September 10th, 2023 Summary: On September…
![Kroll August 2023 SIM Swap Attack](https://getpicnic.com/wp-content/uploads/2023/09/sim-swap-1024x478-1.jpg)
Download PDF Incident Name: Kroll August 2023 SIM Swap Attack Date of Incident: August 19th, 2023 Summary: Kroll is a…
![Okta August 2023 Social Engineering Attack Advisory](https://getpicnic.com/wp-content/uploads/2023/09/okta-advisory-1024x478-1.jpg)
Download PDF Incident Name: Okta August 2023 Social Engineering Attack Advisory Date of Incident: August 2023 Summary: Okta, a provider…
![CoinsPaid July 2023 Social Engineering Attack](https://getpicnic.com/wp-content/uploads/2023/08/AdobeStock_185516334_1024x478.jpg)
Download PDF Incident Name: CoinsPaid Social Engineering Attack Date of Report: August 7th, 2023 Date of Incident: July 22nd, 2023 Summary:…
![How Threat Actors Exploit Generative AI For Social Engineering and Credential Compromise](https://getpicnic.com/wp-content/uploads/2023/08/AdobeStock_471445296_1024x478.jpg)
Social engineering attacks are one of the most commonly used methods for cyber criminals to gain access to sensitive data…
![Henry Ford Health Data Breach](https://getpicnic.com/wp-content/uploads/2023/07/Picture1.png)
Download PDF Incident Name: Henry Ford Health Data Breach Date of Public Report: July 18th, 2023 Date of Incident: March…
![HVT Blog](https://getpicnic.com/wp-content/uploads/2023/07/HVT-Blog.png)
Cybercriminals are always looking for ways to exploit the exposed personal data of high-value targets to breach companies. High-value targets…
![The human element and continuous threat exposure management: How to protect the human attack surface](https://getpicnic.com/wp-content/uploads/2023/07/human-element-CTEM-1024x458-1.jpg)
The importance of understanding and managing the human element in your organization’s security strategy cannot be overstated as the stakes…
![Human Element Remains Key Factor in Cybersecurity: The 2023 Verizon DBIR Report and Picnic’s Global Threat Intelligence Findings](https://getpicnic.com/wp-content/uploads/2023/06/dbir-blog-1024x458.png.jpg)
The spotlight in the fight against cybercrime continues to be an often overlooked yet pivotal factor – the human element.…
![Picnic joins the Tidal Product Registry™](https://getpicnic.com/wp-content/uploads/2023/06/tidal-blog-1024x758c.png.jpg)
We all know that the cybersecurity vendor landscape is extensive and looks complex. Although there is a gap in cybersecurity…
![How Picnic Protects the Human Attack Surface](https://getpicnic.com/wp-content/uploads/2023/06/hasp-video-1024x458-1.png)
Human vulnerabilities create risks to infrastructure and data, which impacts operational, legal, financial, and reputational risks. Picnic prioritizes the vulnerabilities…
![PII](https://getpicnic.com/wp-content/uploads/2023/05/Picture6.png)
As specialists in human attack surface protection, we at Picnic know all too well the importance of preventing the exploitation…
![Mailchimp Report Cover](https://getpicnic.com/wp-content/uploads/2023/05/Mailchimp-Cover-Image.jpg)
Social engineers collect intelligence on human targets to develop paths for attack and compromise. Picnic’s platform emulates this external, human…
![Threat Intel](https://getpicnic.com/wp-content/uploads/2023/04/TIP-BLOG-scaled.jpg)
The exploitation of human attack surface data and a crucial intelligence gap According to Verizon’s 2022 DBIR report, stolen passwords…
![Kodi](https://getpicnic.com/wp-content/uploads/2023/04/Header.png)
Download PDF Incident Name: Kodi February 2023 Data Breach Date of Public Report: April 8th, 2023 Date of Incident: February…
![Uber report](https://getpicnic.com/wp-content/uploads/2023/04/Uber-Pic-scaled.jpg)
Social engineers collect intelligence on human targets to develop paths for attack and compromise. Picnic’s platform emulates this external, human…
![How Picnic Protects Against Credential Stuffing Attacks](https://getpicnic.com/wp-content/uploads/2023/04/cred-stuff-vid.png)
Threat actors leverage exposed credentials, including passwords associated with employee and contractor personal accounts, in order to power credential stuffing…
![Mitigating Credential Compromise and Preventing Credential Stuffing Attacks](https://getpicnic.com/wp-content/uploads/2023/03/jason-jim.png)
Did you know credential compromise was the single largest source of breaches last year?* That’s why incorporating credential-stuffing security practices…
![Threat Intel Briefs Activision](https://getpicnic.com/wp-content/uploads/2023/03/Threat-Intel-Briefs.png)
Download PDF Incident Name: Activision December 2022 Social Engineering Attack and Data Breach Date of Public Report: February 27th, 2023…
![Cybersecurity and the Human Element: Knowing your full attack surface to prevent employee compromise](https://getpicnic.com/wp-content/uploads/2023/03/goodhart.png)
Webinar with Scott Goodhart, CISO Emeritus We talk with Scott Goodhart, CISO Emeritus, on the importance of knowing your human…
![Practical guide to secure your organization against credential stuffing attacks](https://getpicnic.com/wp-content/uploads/2023/03/Picture2-1024x458-1.jpg)
Most cybersecurity whitepapers start with a scary anecdote, a statistic on annual losses in the billions, some specifics on hard-hit…
![credential compromise](https://getpicnic.com/wp-content/uploads/2023/03/AdobeStock_567944839_1024x458.jpg)
Compromised employee credentials are a major threat to any organization’s cyber security. According to Verizon’s 2022 Data Breach Investigation Report,…
![Coinbase](https://getpicnic.com/wp-content/uploads/2023/02/Coinbase.png)
Download PDF Incident Name: Coinbase Social Engineering Attack Date of Incident: February 5th, 2023 Summary: Coinbase is an American cryptocurrency…
![Reddit](https://getpicnic.com/wp-content/uploads/2023/02/Reddit.png)
Download PDF Incident Name: Reddit Feb 2023 Social Engineering Attack and Data Breach Date of Incident: February 5th, 2023 Summary:…
![Preventing the Exploitation of Public Data: How Cybersecurity Teams Can Disrupt Attacker Reconnaissance](https://getpicnic.com/wp-content/uploads/2023/02/kilger-1.png)
Webinar with Dr. Max Kilger We talk with Dr. Max Kilger, Director of the Data Analytics Program and Associate Professor…
![Riot Games](https://getpicnic.com/wp-content/uploads/2023/02/Riot-Games.jpg.png)
Download PDF Incident Name: Riot Games Jan 2023 Date of Incident: January 20th, 2023 Summary: Riot Games is an American video game developer…
![Focus on security education, not cyber awareness training](https://getpicnic.com/wp-content/uploads/2023/01/AdobeStock_548428067-1024x458-1.png)
Written by Karen Walsh Phishing scams and other social engineering attacks work because cybercriminals use people’s digital footprints against them.…
![CEO fraud: Protecting executives protects everyone](https://getpicnic.com/wp-content/uploads/2023/01/AdobeStock_333317926-1024x458-1.png)
Cybercriminals do what they do for money. According to the 2022 Data Breach Investigations Report, 96% of data breaches were…
![Social engineering: What you need to know](https://getpicnic.com/wp-content/uploads/2023/01/Picture10.jpg)
What you’ll learn: What social engineering is Why social engineering matters Which organizations should be concerned Which individuals should be…
![Picnic Target Intelligence Report: Twilio](https://getpicnic.com/wp-content/uploads/2022/12/intel-report.png)
Social engineers collect intelligence on human targets to develop identity paths for attack and compromise. Picnic emulates this external, human…
![Your digital footprint: It’s bigger than you realize](https://getpicnic.com/wp-content/uploads/2022/12/AdobeStock_121047456-1024x458-1.png)
Every day, people follow a set of digital routines. Some people read the news online while drinking their morning coffee.…
![Social engineering: Challenges and solutions in enterprise cybersecurity](https://getpicnic.com/wp-content/uploads/2022/11/Webinar_Jim-Routh.png)
Webinar with Jim Routh In this webinar, we talk with Jim Routh, a former CSO and CISO, and current board member, advisor,…
![Picnic and SLNT: Protecting your organization’s people from compromise by safeguarding their personal information](https://getpicnic.com/wp-content/uploads/2022/11/AdobeStock_459465972-1024x458-1.png)
Exploitation through easily accessible sensitive personal information is the single largest threat to companies and their people today. It’s how…
![Essential guide to open-source intelligence (OSINT)](https://getpicnic.com/wp-content/uploads/2022/11/OSINT-ebook.png)
DOWNLOAD E-BOOK Exploitation through publicly available information is the single largest threat to companies and their people today. Known as…
![Improving the SOC team’s posture against social engineering attacks](https://getpicnic.com/wp-content/uploads/2022/10/Webinar_Jim-S..png)
SANS Cyber Solutions Fest ’22 Webinar with Jim Somborovich, Cybersecurity Leader and Veteran (USMC) SOC teams have historically not had…
![Preemptive visualization and neutralization of social engineering pathways](https://getpicnic.com/wp-content/uploads/2022/10/Webinar_Manit-S..png)
SANS Blue Team Summit ’22 Webinar with Manit Sahib, Picnic Director of Global Threat Intelligence More than 90% of all…
![Managing the human attack surface of critical infrastructure: Social engineering tactics and defense](https://getpicnic.com/wp-content/uploads/2022/10/Webinar_Rob-M.-Lee.png)
Webinar with Robert M. Lee, Dragos Founder and CEO As traditional infrastructure has become sufficiently hardened, hackers have turned to…
![SANS webinar: Know your attack surface from the outside in](https://getpicnic.com/wp-content/uploads/2022/09/Webinar_Matt-P..png)
SANS First Look Webcast with Matt Polak, Picnic Founder and CE0 An attacker needs very little other than open source…
![Just a little bit of exposed personal data can go a long way for a hacker](https://getpicnic.com/wp-content/uploads/2022/09/test-2-1024x458-1.png)
Hackers today use our exposed personal data against us. More than 90% of the time, cyberattacks are specifically crafted from…
![SANS: Know your attack surface from the outside in](https://getpicnic.com/wp-content/uploads/2022/09/Picture11.jpg)
Summary As the rising tide of social engineering attacks evolve in frequency and complexity, organizations are beginning to prioritize solutions…
![RedTeam Raw, Episode #4: Dhruv Bisani on his journey to becoming the Head of Red Teaming at a UK Cyber Security Consultancy](https://getpicnic.com/wp-content/uploads/2022/07/RTR-4.jpg)
In the fourth episode of RedTeam Raw, Picnic’s Director of Global Intelligence, Manit Sahib, sits down with Dhruv Bisani, the Head…
![RedTeam Raw, Episode #3: Dimitris Pallis on how he became an experienced penetration tester, ethical hacker, and current Security Consultant at Claranet](https://getpicnic.com/wp-content/uploads/2022/06/RTR3.jpg)
In the third episode of RedTeam Raw, Picnic’s Director of Global Intelligence, Manit Sahib, sits down with experienced penetration tester, ethical…
![RedTeam Raw, Episode #2: Jean-Francois Maes on how he became a SANS Instructor and Offensive Cyber Security Expert (RedTeamer)](https://getpicnic.com/wp-content/uploads/2022/05/Episode-2-RedTeamRaw.jpg)
In the second episode of RedTeam Raw, Picnic’s Director of Global Intelligence, Manit Sahib, sits down with certified SANS instructor, author,…
![RedTeam Raw, Episode #1: Marcello Salvati on how he became a leading Red Teamer (and Cyber Security Expert)](https://getpicnic.com/wp-content/uploads/2022/04/RTR-Ep-1.jpg)
In the very first episode, Picnic’s own Director of Global Intelligence, Manit Sahib, talks with InfoSec legend Marcello Salvati, most…
![For Lapsus$ social engineers, the attack vector is dealer’s choice](https://getpicnic.com/wp-content/uploads/2022/03/Picture13.png)
By Matt Polak, CEO of Picnic Two weeks ago, at a closed meeting of cyber leaders focused on emerging threats, the…
![Think like a hacker to stop attacks before they strike](https://getpicnic.com/wp-content/uploads/2022/03/555-1024x458-1.png)
By Matt Polak, CEO of Picnic Cyber threat intelligence indicates that there is a high probability of digital retaliation against…
![How to sharpen your corporate social media policy for today’s threats](https://getpicnic.com/wp-content/uploads/2022/01/Picture1-1024x458-1.png)
Using social media is, without a doubt, one of the most popular online activities that internet users engage in. Businesses…
![An ocean of data…and of ears](https://getpicnic.com/wp-content/uploads/2021/12/Picture12-1024x458-1.png)
How much data is produced every day? A quick Google search will tell you the current estimate stands at 2.5…
![Cybercrime awareness is no longer enough to reduce risk](https://getpicnic.com/wp-content/uploads/2021/11/Picture23-1024x458-1.png)
People’s perceptions have changed. Not so long ago we thought nothing of kids playing outside all day alone, unchaperoned visits…
![Are we thinking about Surveillance Capitalism the right way?](https://getpicnic.com/wp-content/uploads/2021/10/Picture7-1024x458-1.png)
I recently purchased a greenhouse from a well-known catalogue retailer – now I’m swamped with Google and Facebook ads for…
![How much control have we given up just to enjoy the digital life?](https://getpicnic.com/wp-content/uploads/2021/09/Picture10-1024x458-1.png)
We all enjoy life in the digital age and the Internet provides us connectivity, efficiency and fun. By submitting some…
![Cybersecurity is a new HR benefit](https://getpicnic.com/wp-content/uploads/2021/08/Picture6-1024x458-1.png)
Cybersecurity has traditionally been seen as a job for IT departments – and most employees assume that cybersecurity is simply…
![Social engineering: Opportunity makes the thief](https://getpicnic.com/wp-content/uploads/2021/07/Picture3-1024x458-1.png)
It is understandable that, when cybercrime happens to you, you can feel like you were targeted. And you certainly might…
![Psychology is the social engineer’s best friend](https://getpicnic.com/wp-content/uploads/2021/06/Picture15-1024x458-1.png)
Social engineering cyber-attacks have rocketed to the forefront of cyber-security risk and have wreaked havoc on large and small companies…
![Ransomware: Stealing your data for fun and profit](https://getpicnic.com/wp-content/uploads/2021/05/Picture1b-1024x458-1.png)
Ransomware is a form of malicious cyberattack that uses malware to encrypt the files and data on your computer or…
![Social engineering in the workplace](https://getpicnic.com/wp-content/uploads/2021/04/Picture16-1024x458-1.png)
Everyone is familiar with the case in which the proverbial “little old lady” is duped out of her life savings…
![A closer look at phishing attacks](https://getpicnic.com/wp-content/uploads/2021/03/Picture4-1024x458-1.png)
Cyber fraud is lurking everywhere across the internet and one of the most effective tactics on victims is “phishing.” Phishing…
![A closer look at phishing attacks](https://getpicnic.com/wp-content/uploads/2021/02/Picture22-1024x458-1.png)
Would a company send me that? We’ve all heard of a phishing email. If you haven’t heard of a phishing…
Get started today
Move beyond the corporate perimeter to reduce human risk and proactively safeguard against cyber threats with zero effort.