Too Long; Didn't Read
The article is intended for white hats, professional pentesters, and heads of information security departments (CISO) It is intended to share several methods of social engineering that can be used in targeted attacks. The need to rob banks with weapons has already gone. Email is enough to penetrate most organizations. However, in many, even big companies, old stereotypes are still present. They place great emphasis on physical security, considering digital less important. Security rules are always written post factum, and therefore they are inert and weakly protect against new threats.