Back

Social Engineering Is About to Be the Only Game in Town

AI is finding and patching zero‑days at machine speed. The traditional attack surface is collapsing. The only place attackers can still win consistently is the user. Learn what that means for CISOs trying to defend the enterprise, and why the operating model that worked for networks, endpoints, and identity has to come to the User Layer next.

Minutes to listen:
by Dune Research Team
18 May 2026
6 minute read
May 18, 2026

FAQs

What is social engineering?
What is the attack surface of social engineering?
How can enterprises stop AI-based social engineering scams?
Why is social engineering effective?
What is User Risk?

Explore Our Latest Insights

Stay updated ith our expert insights and tips
View all
A figure mid-leap against an open sky. Illustrates the moment social engineering became the dominant attack vector and the only game in town. As AI hardens the rest of the security stack, the User Layer is the only surface attackers can reliably win on.A figure mid-leap against an open sky. Illustrates the moment social engineering became the dominant attack vector and the only game in town. As AI hardens the rest of the security stack, the User Layer is the only surface attackers can reliably win on.

Social Engineering Is About to Be the Only Game in Town

AI is finding and patching zero‑days at machine speed. The traditional attack surface is collapsing. The only place attackers can still win consistently is the user. Learn what that means for CISOs trying to defend the enterprise, and why the operating model that worked for networks, endpoints, and identity has to come to the User Layer next.

May 18, 2026
6 minute read
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
Laptop keyboard illuminated by red light, symbolizing cybersecurity threats targeting law firms.Laptop keyboard illuminated by red light, symbolizing cybersecurity threats targeting law firms.

The Top User-Driven Cyber Threats Targeting Law Firms

Law firms sit on some of the most sensitive and valuable data in the enterprise, and attackers have built an entire playbook around exploiting the users who handle it. Learn how four dominant threat vectors are targeting legal sector workflows in 2026 and what it takes to stop attacks at the User Layer.

April 20, 2026
6 minute read
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
A glass skyscraper photographed from below, its curved facade repeating across hundreds of office windows, illustrating the scale of modern enterprise infrastructure. A glass skyscraper photographed from below, its curved facade repeating across hundreds of office windows, illustrating the scale of modern enterprise infrastructure.

The Workforce Has Expanded: How Attackers Are Targeting Enterprise AI Agents

AI agents are being deployed across the enterprise at scale, and attackers have already started engineering against them. Learn how agentic AI expands the enterprise attack surface in ways legacy security programs were never designed to defend.

April 8, 2026
7 minute read
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Never Miss a User Risk Insights

Subscribe to our newsletter for weekly insights on emerging threats, user risk trends, and the defense strategies shaping modern enterprise security.
Thanks for submitting the form!
Oops! Something went wrong while submitting the form.