Tech Industry News

Stay informed to keep up with the latest trends, innovations, and issues.

Your KnowBe4 Fresh Content Updates from March 2026

John N Just, Ed.D. – Chief Learning Officer

IT & Technical Staff Need More Training, Not Less
There is a common misconception that IT and technical staff “know about security awareness” and that they should should simply take the same training that all other employees take. However, those with privileged access are often targeted more than a standard user. A recent trend is conducting training for these roles being monthly or quarterly with microcontent rather than the old-fashioned once per year method. With this in mind, you will notice we are highlighting two new pieces of training content for IT staff, bringing the total for these individuals with privileged access to 85 pieces of content in the ModStore. Look for more to be released in the coming months as we keep content fresh for this important group.

“Understandable, digestible, and timely!”

Attacks on IT Help Desks
Video Module
Stop social engineering at the help desk. This video shows IT staff how criminals impersonate employees to steal passwords and confidential information.

“Learned new things on how to protect the organization from unauthorized users and hackers!” 

Privileged User Security: Secure Database Administration
Training Module
Secure your most sensitive data. This module teaches database administrators and privileged users with database access essential practices to mitigate external and insider threats.

Bring Your Own Device (BYOD)
Training Module
Secure your personal devices for work. Learn practical instructions for safe BYOD use without compromising your organization’s data security.

Deepfake or Reality?
Video Module
Deepfakes are a real threat. See how criminals use AI-driven forgeries for scams and disinformation. Learn the consequences of these attacks and how to protect yourself. 

Job Candidate Deepfakes
Video Module
Don’t get fooled by AI fraud. This video explores the rising threat of deepfake candidates and provides strategies to secure your remote hiring process.

A Quick Guide to Secure Communication
Video Module
What’s sent is sent. Learn mindfulness techniques, how to recognize manipulated messages and how to use AI to protect sensitive data from social engineering.

Security Snippets – Ransomware Defense
Video Module
Combat automated ransomware assaults. Identify phishing and deepfake entry points. Implement defense strategies like the 3-2-1 backup rule and multi-layered security.

Security Snippets: Recognizing Ransomware Attacks
Training Module
Protect your organization from devastating ransomware attacks. Learn to identify, prevent and respond to modern double extortion tactics.

Six Steps to Protecting Your Digital Privacy
Video Module
Master six essential steps to secure your personal and workplace data. Elevate your cybersecurity with proven, practical strategies.

 

Anti-Fraud Pledge
Poster
Fortify your organization during Fraud Awareness Week. Take the pledge to stay alert, verify all requests and report suspicious activity immediately. 

Beware of Scams on WhatsApp
Document
Spot the trap! Learn how to identify suspicious WhatsApp messages and how to protect yourself against these scams. An important printable guide for your workplace.

BYOD: Working Securely with Personal Devices
Document
Provides secure BYOD guidelines. Learn to protect data, separate personal and work use and follow proper procedures in case of device loss or theft.

“I Trusted Them” Never Stopped a Breach
Poster
Reinforce Zero Trust principles with this powerful security poster. Continuous verification is the most secure way to protect your workplace data.

One Device, Two Worlds: BYOD
Poster
Effectively separate personal and professional use on BYOD devices. This poster helps minimizes security risks and protects organizational data.

Pay Attention to Scams on WhatsApp
Document
Spot the trap! Learn how to identify suspicious WhatsApp messages and to avoid clicking on suspicious links. A crucial, printable guide for your workplace.

Protecting Your Digital Identity: 6 Steps for Privacy by Practice
Document
Learn six essential steps for digital privacy. Practical strategies such as securing devices, using MFA and verifying requests to protect your data.

Watch Out for Scams on WhatsApp
Document
Spot the trap! Beware of alarming messages and always verify by contacting your bank through official channels. A crucial, printable guide for your workplace.
個人端末の業務利用:いつでも、どこでも、安全に働くために (BYOD) (Using personal devices for work: Working safely, anytime, anywhere [BYOD])
Training Module
Master BYOD best practices for remote and hybrid work. This training provides practical solutions for security, like what to do in the event of device loss or theft.
*Available in Japanese only
参考資料:管理職向け 情報セキュリティ研修 (Reference Material: Information Security Training for Managers)
Document
Learn specific scam tactics to spot phishing emails and protect your data. Use this essential guide for training and review.
*Available in Japanese only

管理職向け 情報セキュリティ研修 (Information Security Training for Managers)
Document
Equip managers with essential security knowledge. Master the skills to effectively address security challenges in daily team operations.
*Available in Japanese only

 



NEW! – ModStore AI Search and Recommendations

The KnowBe4 ModStore makes it easier than ever to find, evaluate and use the most relevant training content with AI Search and Recommendations. AI-powered search supports natural language queries and delivers more accurate results based on intent, context and relevance, while tailored recommendations highlight modules aligned to your organization’s industry, region and training history. The streamlined interface simplifies how you explore and add content directly to your library or campaigns, significantly reducing the time spent searching for and managing training.

For KSAT Diamond customers, pre-built Learning Paths curated by KnowBe4’s award-winning content experts help you quickly deploy structured campaigns aligned to specific roles or compliance needs.

To see all the features of the KnowBe4 platform, request your demo today!

Request a Demo

Don’t like to click on redirected links? Copy and paste this into your browser:
https://info.knowbe4.com/kmsat-request-a-demo-content-update

NEW! – Microsoft Teams Phish Alert Button (PAB)

The Teams PAB is now available to help your users report suspicious messages with the same one-click ease they use for email. By unifying your incident response, you ensure that a threat reported in a chat receives the same rigor as a phishing email—collapsing the time between a malicious message and a global SOC alert from hours to seconds.

To learn more about the Phish Alert Button with Microsoft Teams, visit our support article here: https://support.knowbe4.com/hc/en-us/articles/48585064186003-Microsoft-Teams-Phish-Alert-Button-PAB-Product-Manual 

KB4-CON is just around the corner, and we’re gearing up for our biggest event yet! Haven’t secured your spot to be with us this May?

Here are the top 5 reasons to join us in Orlando:

  1. Hear from world renowned climber Alex Honnold

  2. Look to the future with CEO Bryan Palma

  3. See what’s coming on the KnowBe4 roadmap

  4. Be the first to see The Inside Man Season 7

  5. Soak up the sun in Orlando 

KB4-CON brings together customers, partners and security leaders all in one place. Don’t miss the cybersecurity event of the year!

Save My Spot

Don’t like to click on redirected links? Copy and paste this into your browser: https://knowbe4.cventevents.com/gB4YnZ?RefId=EmailContentUpdate  

Read more

Phishing Attacks Are Exploiting the War in Iran

Criminal threat actors are taking advantage of the fear and uncertainty surrounding the conflict in the Middle East, according to researchers at Bitdefender. The researchers observed a 130% spike in phishing emails targeting Gulf countries following the first US-Israeli strikes on Iran on February 28th.

“After Feb. 28, phishing and malware emails targeting Gulf countries surged and stayed elevated,” the researchers write. “Within days, activity doubled, and at peak reached nearly four times the baseline levels, signaling a sustained and coordinated spike rather than a one-off campaign. This clearly suggests that phishing and malware delivery campaigns are being deployed and adjusted in real time, with attackers capitalizing on heightened regional sensitivity and business disruptions.”

While state-sponsored threat actors are conducting phishing campaigns in the region, Bitdefender believes much of this surge is driven by financially motivated attackers. Criminals frequently exploit world events to launch social engineering attacks designed to make people act quickly. In this case, many of the attacks are using business-themed lures such as invoices, contracts, banking documents, and delivery notifications, which take advantage of shipping disruptions across the region.

Bitdefender outlines the following best practices to help users avoid falling for social engineering attacks:

  • Careful with unexpected attachments. Even if an email looks business-related (invoice, contract, shipment), treat attachments with suspicion, especially if you weren’t expecting them. When in doubt, confirm with the sender through a separate, trusted channel.
  • Don’t trust file types at face value. Not all threats come as obvious .exe files. In these campaigns, malware was hidden in formats like .eml, .jar, .rar, and .hta. If you’re not sure what a file does, don’t open it.
  • Avoid opening compressed archives from unknown sources. Files delivered in .zip or .rar archives are commonly used to bypass filters and hide malicious payloads. These should always raise an extra layer of caution.
  • Watch for urgency and pressure tactics. Messages that push you to act quickly (verify an account, release a payment, review a document ‘immediately’) are designed to override your judgment. Take a moment to verify before clicking anything.
  • Check links before clicking. Hover over buttons or links to inspect the actual destination. If the domain looks unfamiliar, misspelled, or unrelated to the supposed sender, don’t proceed.
  • Verify financial and legal requests independently. If an email involves money, contracts, or sensitive data, confirm it through official channels: call the company, use a known contact, or log in to your account directly instead of using email links.

KnowBe4 empowers your workforce to make smarter security decisions every day. Over 70,000 organizations worldwide trust the KnowBe4 HRM+ platform to strengthen their security culture and reduce human risk.

Bitdefender has the story

Read more

The New Playground for Cybercriminals: Securing the Microsoft Teams Frontier

With 320 million daily users on Microsoft Teams, the ability to connect with colleagues across the organization has never been more seamless… or more targeted.

The shift isn’t just about where we talk; it’s about how we are being attacked. Threat actors moving beyond phishing emails and are infiltrating into the trusted spaces where your employees feel safest. 

Starting in 2023, hackers began shifting their focus to Microsoft Teams with massive success, exploiting a high-trust environment where users are significantly more likely to comply with deceptive, urgent requests. By 2025, threat actors introduced callback phishing and voice phishing (vishing) as preferred methods to manipulate employees directly through Microsoft Teams. 

Because of the level of sophistication in these attacks, relying solely on native anti-phishing rules has proven risky. Recent logic errors in these heuristic systems have caused significant operational disruptions, mistakenly blocking thousands of legitimate work messages and critical links.

Introducing the Microsoft Teams Phish Alert Button (PAB)

To meet these escalating threats, KnowBe4 is extending our defenses into the collaboration space. The Microsoft Teams Phish Alert Button allows your workforce to remain vigilant outside the inbox and report suspicious activity using the same workflow you’ve already trained them to use.

By adding the Microsoft Teams PAB to your arsenal, your organization gains:

Read more