Skip to content
Shield

Record breach levels, social engineering dominating, and an active campaign targeting 100+ organizations.

Welcome to The Optery Dispatch — a newsletter delivering the latest insights on threat intelligence and proactive cybersecurity strategy. In Issue #10, published February 17, 2026, we cover: Breach Activity Hits Record High as Social Engineering Remains the Leading Root Cause The ITRC’s 2025 report shows phishing, smishing, and BEC dominating across public and private sectors TheContinue reading "Record breach levels, social engineering dominating, and an active campaign targeting 100+ organizations."
Shield

Holiday Privacy and Security Tips: Protect Yourself and Your Loved Ones

The holidays are a time for joy and togetherness—but they’re also a time when scammers and cybercriminals are most active. Staying safe requires keeping your personal information out of their hands.  Below are five essential cybersecurity tips for protecting yourself and your loved ones this holiday season. 1. Find and Address Your Personal Data ExposureContinue reading "Holiday Privacy and Security Tips: Protect Yourself and Your Loved Ones"
Shield

AI-Driven Social Engineering, Evasive Phishing Techniques, and a Glimpse into Modern Infostealer Operation

  Welcome to The Optery Dispatch — a newsletter delivering the latest insights on threat intelligence and proactive cybersecurity strategy. In Issue #8, published December 16, 2025, we cover: The AI-fication of Cyberthreats: Trend Micro 2026 Predictions The cyber threat landscape is evolving into a contest of speed, adaptability, and automation, requiring a shift beyondContinue reading "AI-Driven Social Engineering, Evasive Phishing Techniques, and a Glimpse into Modern Infostealer Operation"
Shield

New Phishing Methods Evade Email Defenses as Social Engineering Dominates Initial Access

Welcome to The Optery Dispatch — a newsletter delivering the latest insights on threat intelligence and proactive cybersecurity strategy. In Issue #7, published November 25, 2025, we cover: Microsoft’s Digital Defense Report 2025 shows social engineering techniques dominating initial access methods, accounting for 89% of observed attacks ClickFix has become a go-to initial access method which traditionalContinue reading "New Phishing Methods Evade Email Defenses as Social Engineering Dominates Initial Access"
Shield

Optery Named Winner of the 2025 Top InfoSec Innovator Award for Most Innovative Anti-Phishing

Optery has been named the winner of the 2025 Most Innovative Anti-Phishing award from Cyber Defense Magazine! Now in its 13th year, the Cyber Defense Awards, presented during CyberDefenseCon 2025, honor companies delivering exceptional solutions in cybersecurity. Optery is unique among personal data removal solutions, combining sophisticated patented search technology with automated opt-out software to discover andContinue reading "Optery Named Winner of the 2025 Top InfoSec Innovator Award for Most Innovative Anti-Phishing"
Shield

Salesforce Breaches, Social Engineering & Agentic AI Threats

  Welcome to The Optery Dispatch — a newsletter delivering the latest insights on threat intelligence and proactive cybersecurity strategy. In Issue #5, published September 30, 2025, we cover: Salesforce Attacks: FBI FLASH Alert UNC6040 and UNC6395 are breaking into Salesforce environments to steal data and extort victims. The FBI, in an alert from September 12, hasContinue reading "Salesforce Breaches, Social Engineering & Agentic AI Threats"
Shield

Data Brokers, Social Engineering, and Enterprise Security: Optery’s Paul Mander on the Unscripted Podcast

Optery for Business GM Paul Mander recently joined cybersecurity expert and host David Raviv on the Unscripted Podcast to reveal how personal data is collected, sold, and weaponized, and how Optery helps individuals and companies fight back. From cookies to data brokers to playing offense against social engineering, this episode covers it all. Paul satContinue reading "Data Brokers, Social Engineering, and Enterprise Security: Optery’s Paul Mander on the Unscripted Podcast"
Shield

Data Brokers Used to Target Orgs, Social Engineering is #1 Attack Vector

  Welcome to The Optery Dispatch — a newsletter delivering the latest insights on threat intelligence and proactive cybersecurity strategy. In Issue #4, published August 26, 2025, we cover: New Joint CISA/FBI/CNMF Advisory Is Latest Confirmation that Attackers Use Commercial Data Brokers to Target Organizations Advisory follows a string of evidence showing attackers leveraging data brokers forContinue reading "Data Brokers Used to Target Orgs, Social Engineering is #1 Attack Vector"
Shield

New Joint CISA/FBI/CNMF Advisory Is Latest Confirmation that Attackers Use Commercial Data Brokers to Target Organizations

Advisory follows a string of evidence showing attackers leveraging data brokers for recon and social engineering The joint CISA/FBI/CNMF updated advisory on Scattered Spider acknowledges what several analysts have previously noted: the threat group is using commercial data brokers as part of their reconnaissance toolkit and as fuel for social engineering. In its July 29,Continue reading "New Joint CISA/FBI/CNMF Advisory Is Latest Confirmation that Attackers Use Commercial Data Brokers to Target Organizations"
Shield

Unit 42 Report: Social Engineering Is the #1 Initial Access Vector 

Palo Alto Networks’ latest Unit 42 Global Incident Response Report: Social Engineering Edition shows that social engineering remains the #1 initial access vector. Among the more than 700 cases Unit 42 investigated between May 2024 and May 2025, 36% of all incidents began with social engineering. Of those: More Stats from the Report Additional InsightsContinue reading "Unit 42 Report: Social Engineering Is the #1 Initial Access Vector "
Shield

Scattered Spider, Social Engineering, and Ransomware

  Welcome to The Optery Dispatch — a newsletter delivering the latest insights on threat intelligence and proactive cybersecurity strategy. In Issue #3, published July 24, 2025, we cover: Scattered Spider’s Use of Data Brokers Reconnaissance, Targeting, Threats One of today’s most dangerous threat groups is using data brokers to build detailed victim profiles, impersonate employees, andContinue reading "Scattered Spider, Social Engineering, and Ransomware"
Shield

Social Engineering Is the #1 Attack Vector: Highlights from the ITRC’s H1 2025 Data Breach Report

The Identity Theft Resource Center’s 2025 H1 Data Breach Report is out. AI-powered phishing attacks continue to rise, phishing/smishing/BEC topped the list of known attack vectors, the supply chain is a critical weakness, breach notifications still lack critical details, and financial and healthcare sectors remain prime targets. Here are some highlights: “The overwhelming majority ofContinue reading "Social Engineering Is the #1 Attack Vector: Highlights from the ITRC’s H1 2025 Data Breach Report"
Shield

Phishing’s Role in Breaches: Behind the Numbers of Verizon’s 2025 DBIR

The 2025 Verizon Data Breach Investigations Report (DBIR) is one of the most respected and widely cited sources on cybersecurity incidents. Each year, its analysis shapes how organizations and security leaders understand the threat landscape. At first glance, the 2025 report shows phishing falling behind: it ranks phishing as the third most common initial accessContinue reading "Phishing’s Role in Breaches: Behind the Numbers of Verizon’s 2025 DBIR"
Shield

Optery Wins 2025 Fortress Cybersecurity Award for Privacy Enhancing Technologies

Optery has been named a winner in the 2025 Fortress Cybersecurity Awards, presented by the Business Intelligence Group. We were recognized in the category of Privacy Enhancing Technologies for our work in reducing the online exposure of employee and executive personal data—the most exploited vulnerability in modern cyberattacks. The Fortress Cybersecurity Awards program honors the industry’s leading companies andContinue reading "Optery Wins 2025 Fortress Cybersecurity Award for Privacy Enhancing Technologies"
Shield

Agentic AI, phishing, and proactive defense

Welcome to The Optery Dispatch — a newsletter delivering the latest insights on threat intelligence and proactive cybersecurity strategy. In Issue #1, published May 27, 2025, we cover: Cybersecurity in the Age of Agentic AI Insights from Industry Leaders Agentic AI was everywhere at RSAC 2025—and it’s quickly emerging as a major force reshaping cybersecurity. In aContinue reading "Agentic AI, phishing, and proactive defense"
Shield

Cybersecurity in the Age of Agentic AI: Insights from Industry Leaders

Agentic AI was everywhere at RSAC 2025—and it’s quickly emerging as a major force reshaping cybersecurity. In a recent in-depth feature by Cybersecurity Tribe, twenty-one cybersecurity leaders shared how agentic AI is already transforming the cybersecurity landscape—from accelerating threat detection and automating defense, to creating new challenges posed by adversaries. Among them was Optery’s Founder and CEO, LawrenceContinue reading "Cybersecurity in the Age of Agentic AI: Insights from Industry Leaders"
Shield

Fortinet’s 2025 Threat Report Makes the Case for Proactive Exposure Management  

Fortinet’s 2025 Global Threat Landscape Report shows attackers are moving faster and with greater precision—fueled by automation, AI, and a thriving underground economy for stolen credentials. Here are some of the key findings: “From pre-attack reconnaissance to post-compromise persistence, attackers now operate with unprecedented speed, precision, and reach, challenging organizations to shift from reactive defenseContinue reading "Fortinet’s 2025 Threat Report Makes the Case for Proactive Exposure Management  "
Shield

SMBs in the Crosshairs: Key Findings from CrowdStrike

CrowdStrike’s latest survey on SMB cybersecurity shows smaller businesses are in the crosshairs. Phishing is surging. Ransomware is hitting the smallest businesses hardest. And most SMBs are still operating with outdated tools, limited budgets, and big execution gaps. Below are some of the report’s findings. “Small and medium-sized businesses (SMBs) are no longer flying underContinue reading "SMBs in the Crosshairs: Key Findings from CrowdStrike"
Shield

Optery Wins Best Service for Attack Surface Management in the 13thAnnual Global InfoSec Awards at RSAC 2025

Optery has won the Best Service for Attack Surface Management award from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. Now in its thirteenth year, the Global InfoSec Awards recognize cybersecurity companies with innovative and compelling solutions that push the industry forward. “Data broker exposure, now officially part of the enterprise attackContinue reading "Optery Wins Best Service for Attack Surface Management in the 13thAnnual Global InfoSec Awards at RSAC 2025"
Shield

Credential Phishing and Infostealers Surge in IBM’s X-Force 2025 Threat Intelligence Index

The IBM X-Force 2025 Threat Intelligence Index shows a rise in infostealers delivered via phishing emails and credential phishing. Organizations must limit their exposure as part of their threat management strategy. Below are some of the report’s findings. The report notes that “threat actors are using AI to build websites and incorporate deepfakes in phishingContinue reading "Credential Phishing and Infostealers Surge in IBM’s X-Force 2025 Threat Intelligence Index"
Shield

Organizations must shift to proactive cybersecurity, according to the 2025 Armis Cyberwarfare Report

The 2025 Armis Cyberwarfare Report highlights the ramifications of AI and the need for organizations to move beyond reactive measures if they want to protect their operations and the people they serve.  This latest study, conducted by Censuswide, surveyed over 1,800+ IT decision-makers in companies with 1,000+ employees in the U.S., UK, Italy, France, Australia,Continue reading "Organizations must shift to proactive cybersecurity, according to the 2025 Armis Cyberwarfare Report"
Shield

Personal Data Removal: A Core Cybersecurity Measure

Why data broker removal is a must-have for organizations Personal data exposure is the biggest cyber threat to organizations today. It enables the most successful attack vectors: social engineering and the use of compromised credentials. Despite this reality, many companies continue to overlook a major security risk—vast amounts of employee and executive personal data readilyContinue reading "Personal Data Removal: A Core Cybersecurity Measure"
Shield

CrowdStrike’s 2025 Global Threat Report Reveals Phone-Based Social Engineering Is Surging

CrowdStrike’s 2025 Global Threat Report reveals adversaries are increasingly using identity compromise and social engineering to gain initial access and perform lateral movement.  In 2024, CrowdStrike Intelligence tracked a sharp rise in distinct campaigns leveraging telephone-based social engineering for initial access, including vishing and help desk impersonation tactics. Multiple adversaries incorporated vishing into their intrusionsContinue reading "CrowdStrike’s 2025 Global Threat Report Reveals Phone-Based Social Engineering Is Surging"
Shield

Leaked Chat Logs Reveal Black Basta’s Use of Data Brokers for Targeting Victims

A newly leaked trove of internal chat logs has exposed how the Black Basta ransomware gang leverages data broker info to research and target their victims. Black Basta is a notorious Russian-language ransomware group responsible for hundreds of cyberattacks on critical infrastructure and businesses worldwide. Known for its aggressive tactics, Black Basta has targeted majorContinue reading "Leaked Chat Logs Reveal Black Basta’s Use of Data Brokers for Targeting Victims"
Shield

Privacy Protectors Spotlight: Jeff Jockisch

In the eighth installment of our Privacy Protectors Spotlight series, we are excited to feature data privacy expert Jeff Jockisch! Jeff Jockisch is a highly regarded data privacy researcher specializing in the data broker ecosystem and commercial surveillance. His expertise spans data science, governance, and operational design, with a strong foundation in building knowledge graphs,Continue reading "Privacy Protectors Spotlight: Jeff Jockisch"
Shield

Optery Named Top InfoSec Innovator Award Winner for Attack Surface Management by Cyber Defense Magazine for 2024

We are excited to announce that Optery has won Cyber Defense Magazine’s Top InfoSec Innovator Award for Most Innovative Attack Surface Management during CyberDefenseCon 2024! We are honored to be recognized in one of the world’s most prestigious cybersecurity awards and to be among such a distinguished group of innovators. The Top InfoSec Innovator AwardsContinue reading "Optery Named Top InfoSec Innovator Award Winner for Attack Surface Management by Cyber Defense Magazine for 2024"
Shield

Protect Against Impersonation, Email Forgery, and Business Email Compromise Attacks

Email impersonation attacks, such as Business Email Compromise (BEC), are among the most costly and damaging cyber threats to organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC alone accounted for nearly $2.95 billion in reported losses in 2023, making it one of the most financially devastating forms of cybercrime. While BEC isContinue reading "Protect Against Impersonation, Email Forgery, and Business Email Compromise Attacks"
Shield

Safeguard Employees: Phishing Email Protection

Phishing attacks continue to be one of the most widespread and damaging cyber threats to organizations. While new email security measures for bulk senders have made mass email phishing more difficult for attackers, spear-phishing (aimed at a single target) continues to be a top attack vector. The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) recently releasedContinue reading "Safeguard Employees: Phishing Email Protection"
Shield

Social Engineering Attacks and How Organizations Can Prevent and Defend Against Them

The vast majority of cyber attacks today begin with social engineering: the act of using exposed personal data to manipulate human targets into providing unauthorized access to an organization’s systems or data. As cybercriminals increasingly target the human element, social engineering has become the number one threat to businesses, leading to account takeovers, data breaches,Continue reading "Social Engineering Attacks and How Organizations Can Prevent and Defend Against Them"
Shield

Privacy Protectors Spotlight: Rachel Tobac

In the latest installment of our Privacy Protectors Spotlight series, we are excited to feature Rachel Tobac, a renowned expert in human hacking and social engineering defense strategies. Rachel Tobac is an ethical hacker and the CEO of SocialProof Security, a company dedicated to helping businesses and individuals protect their sensitive data from cyber threats, particularlyContinue reading "Privacy Protectors Spotlight: Rachel Tobac"
Shield

PII Removal for Executives is Not Enough

Protecting a Broader Range of Employees is Essential Are your personal data removal efforts only focused on protecting your executives? In an era where mass SMS-phishing (smishing) campaigns and other social engineering attacks targeting non-executive staff are prevalent, extending personal data removal beyond just the C-Suite is essential. Our new whitepaper, “PII Removal for ExecutivesContinue reading "PII Removal for Executives is Not Enough"
Shield

Phishing and Personal Data Breach Crimes are Finally on the Decline

Since the groundbreaking California Consumer Privacy Act (CCPA) went into effect in 2020, consumer data privacy and security has improved dramatically for all Americans. We believe personal data removal services and authorized agents such as Optery have been major contributors to this progress helping educate the public about data privacy, helping maximize data privacy and security protections, and eradicating millions of pieces of unwanted Personal Identifiable Information (PII) from the internet. 

Ready to safeguard your personal data?

Join the movement of people strengthening their privacy
Sign Up Free