The new Cyber Threat Psychology Research Project intends to set the focus on the supply side i.e. the hackers and their motivations and incentive structures, what made them become a hacker, the transmission mechanisms supporting the attack to succeed, and of course also on the receiving side i.e. the victims.
Cyber Threats often have a strong psychological component underneath which facilitates the success of the attacks. The new Cyber Threat Psychology Research Project intends to set the focus on the supply side i.e. the hackers and their motivations and incentive structures, what made them become a hacker, the transmission mechanisms supporting the attack to succeed, and of course also on the receiving side i.e. the victims. Our goal is to find patterns which can be leveraged to influence the supply side and the transmission mechanisms, and to broadly communicate these, with the goal of changing mindset at the supply side and interrupting the transmission channels where possible.
Working Group Sessions have taken place on 10 Feb 2025, 24 Feb 2025 and on 10 March 2025. Initial activities have encompassed scoping of the activities, goals and deliverables definition, and description of the research topics to be addressed. Next steps are the creation of the Research Project’s Baseline and Working Group Charter.
Active contribution by specialists in defensive and offensive security, Security Operations, Threat & Vulnerability Management, Cyber Forensics, Cyber Criminology, Youth Psychology, Psychology and Behavioural Sciences are encouraged you contact us for participation. Please reach out to Rolf Becker.
We are pleased to share some highlights from our most recent event.
Artificial intelligence (AI) is rapidlytransforming various aspects of our lives, driving increased efficiency andautomation. However, this technological advancement also presents significantchallenges to cybersecurity. Cybercriminals, unconstrained by ethicalconsiderations, are increasingly leveraging AI for malicious purposes, withsocial engineering attacks being a prime target. The growing accessibility ofAI tools further exacerbates this issue, making it easier for even lesssophisticated actors to deploy these tactics.
Read More