Cybersecurity and Applied AI career intelligence
© 2026 Bespoke Intermedia LLC
Founded by Julian Calvo, Ed.D., M.S.
A social engineering technique where the attacker creates a fabricated scenario (the pretext) to manipulate a target into providing information or access. The attacker assumes a fake identity, such as a vendor, coworker, or auditor, and builds rapport before making their request.
Pretexting is the foundation of most sophisticated social engineering attacks. Penetration testers develop pretexts for phone calls, emails, and in-person engagements. Incident responders must recognize pretexting patterns when investigating business email compromise. GRC analysts design policies to verify identities before granting access.
A social engineering technique where the attacker creates a fabricated scenario (the pretext) to manipulate a target into providing information or access. The attacker assumes a fake identity, such as a vendor, coworker, or auditor, and builds rapport before making their request.
Pretexting is the foundation of most sophisticated social engineering attacks. Penetration testers develop pretexts for phone calls, emails, and in-person engagements. Incident responders must recognize pretexting patterns when investigating business email compromise. GRC analysts design policies to verify identities before granting access.
Cybersecurity professionals who work with Pretexting include Penetration Tester, Incident Responder, GRC Analyst. These roles apply Pretexting knowledge within the Offensive Security domain.
Definitions are original explanations written for career development purposes. For authoritative technical definitions, refer to NIST, ISO, or the relevant standards body.
Was this page helpful?
Join cybersecurity professionals receiving weekly intelligence on threats, job market trends, salary data, and career growth strategies.
Weekly insights on threats, job trends, and career growth.
Unsubscribe anytime. More options