Those are like Gold mines to social engineers.
This is the primary method hackers use instead of physically breaking into a system.
What is social engineering?
This is the name of the password manager used for internal and external sharing.
What is 1password?
This common tactic is often the first action in attacks, used to capture credentials or deliver malicious files.
What are malicious emails/phishing?
This popular activity involves children dressing in costumes and going door-to-door to collect treats.
What is trick-or-treating?
This is a powerful tool for social engineers.
What is distraction?
In this phase, an attacker makes contact and attempts to establish trust.
What is the hook?
This platform is used for on-call and incident management.
What is PagerDuty?
This type of hacker is driven by ideology and targets entities to protest or expose issues.
What is a Hacktivist?
This U.S. state grows the most pumpkins.
What is Illinois?
Always keep this on you and out of sight so it can't be photographed or cloned, lost or stolen.
What is a badge?
Attackers use these subtly altered web addresses to trick users, often by changing a single character.
What is a lookalike domain?
This new VPN is utilized to access internal and cloud resources owned by Amount.
What is Cloudflare Warp?
This attack, which started as a phishing campaign in September 2025, targeted NPM package maintainers and compromised over 180 packages.
What is the Shai-Hulud Worm attack?
This creature of the night is said to transform into a bat and drink blood.
What is a vampire?
These locations are prime targets for hackers.
What are public spaces like bars and coffee shops?
This period is a prime target for hackers due to confusion, new systems, and rushed decisions.
What are mergers and acquisitions (M&A)?
This Data Loss Prevention and Email Encryption tool replaced Virtru and EndPoint Protector.
What is NightFall?
This attack involved gaining access to a third-party's GitHub environment, stealing OAuth tokens, and exfiltrating data from Salesforce instances.
What is the Salesforce-Salesloft/Drift AI Breach?
Before pumpkins, this root vegetable was originally used to make jack-o'-lanterns in Ireland.
What are Turnips?
This is a new and challenging misuse of camera technology.
What is a deepfake?
This type of attack involves attackers spoofing company executives' emails to request urgent wire transfers.
What is business email compromise (BEC) / CEO impersonation?
This individual was recognized as the Top KnowBe4 Reporter in 2025.
Who is Anandha Sudhan?
This group, attributed by the FBI, stole approximately $1.5 billion in Ethereum by exploiting wallet vulnerabilities.
Who is the Lazarus group (North Korea)?
This famous horror author wrote "The Raven" and "The Tell-Tale Heart," both with dark and macabre themes often associated with Halloween.
Who is Edgar Allan Poe?