
As cyber threats become increasingly sophisticated, human factors remain one of the most exploited vulnerabilities in security breaches, particularly in the context of Advanced Persistent Threats (APTs). Traditional cybersecurity approaches focus on technological defenses, yet they often overlook the cognitive biases, social engineering tactics, and decision-making errors that adversaries exploit. This review explores the integration of behavioral science with CTI as a strategic approach to counter APTs and mitigate human-enabled security breaches. By examining cognitive vulnerabilities, psychological manipulation techniques, and behavior-based interventions, this study highlights the need for adaptive security frameworks that incorporate human-centric defenses. Additionally, the role of artificial intelligence and machine learning in enhancing behavior-based threat detection and response is discussed. The review further addresses challenges in integrating behavioral insights with CTI, ethical considerations, and emerging advancements in human-centric cybersecurity models. Ultimately, this paper advocates for a multidisciplinary approach that combines behavioral science and CTI to develop proactive, intelligence-driven security strategies capable of addressing the evolving cyber threat landscape.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 7 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
