Phishing is the most prominent form of cyber-attack, regularly prompting email recipients into disclosing their personal information, …
Phishing is the most prominent form of cyber-attack, regularly prompting email recipients into disclosing their personal information, …
Independent research shows that 91% of organizations have experienced outbound email security incidents in their Microsoft 365 environments. …
There's a beautiful moment happening right now, and by "beautiful" I mean "horrifying in that can't-look-away-from-the-car-crash sense”.
Social engineering remained the top initial access vector for cyberattacks in 2025, with increasing assistance from AI tools, according to a …
People accidentally send emails to the wrong recipients every day. The impact of these incidents can be relatively minor if there is no …
AI-driven fraud attacks spiked by more than 1200% in December 2025, according to a new report by Pindrop Security. Threat actors are using AI …
Prior to my further research into AI and quantum for my latest book, How AI and Quantum Impact Cyber Threats and Defenses, I had pretty solid …
Cybercriminals are abusing legitimate invoices and dispute notifications from popular services to send scam emails that bypass security …
There's a moment in every security professional's career when they realise the game has fundamentally changed. Mine came last Tuesday at 3:47 …
CyberheistNews Vol 16 #07 | February 17th, 2026 Uncovering the Sophisticated Phishing Campaign Bypassing M365 MFA …
North Korean hackers continue to target software developers via social engineering attacks, according to researchers at Recorded Future.
I am excited to announce my latest book, How AI and Quantum Impact Cyber Threats and Defenses: Shaping Your Cyber Defense Strategies.
Researchers at Okta warn that a series of phishing kits have emerged that are designed to help threat actors launch sophisticated voice …
Lead Analysts: Jeewan Singh Jalal, Prabhakaran Ravichandhiran and Anand Bodke KnowBe4 Threat Labs has detected a sophisticated phishing …
Valentine’s Day is usually a time for flowers and candlelight, but in recent years the digital dating landscape has shifted from a place of …
If you look back just a couple of years, the digital landscape looks almost unrecognizable. We’ve moved from AI being a cool new tool to it …
The first requirements set forth for the EU AI Act start this month (February). Luckily, this regulation starts with some of the easiest …
A new malware-as-a-service (MaaS) kit called “Stanley” is offering users guaranteed publication in the Chrome Web Store, bypassing Google’s …
We are very excited that 2025 broke all of our records for usage and quality ratings of our content on the platform! Our 2025 records were…
Researchers at Palo Alto Networks’ Unit 42 warn of a proof-of-concept (PoC) attack technique in which threat actors could use AI tools to …
Commodity phishing platforms are now a central component of the cybercriminal economy, according to researchers at Flare. These platforms …
A new survey by Vodafone Business found that more than 10% of companies in the UK would likely go out of business if they were hit by a major …
In the relentless growth of the phishing landscape, technical advances like AI have made attack methods two-pronged. They target technical …
A phishing campaign is abusing LinkedIn private messages to target executives and IT workers, according to researchers at ReliaQuest. The …
CyberheistNews Vol 16 #05 | February 3rd, 2026 [Heads Up] New “Fancy” QR Codes Are Making Quishing More Dangerous QR …
One of my first intentional “to-dos” this year has been spending time with the World Economic Forum’s Global Cybersecurity Outlook 2026, a …
With organizations collecting and storing massive amounts of personal data these days, much of which people share freely, we need to become …
Scammers are increasingly using visually stylized QR codes to deliver phishing links, Help Net Security reports. QR code phishing (quishing) …
Forty percent of employees have never received cybersecurity training, according to a new report from Yubico. That number rises to nearly …
A widespread phishing campaign is targeting LinkedIn users by posting comments on users’ posts, BleepingComputer reports. Threat actors are …
For those of you who are like me, when I first heard about the new EU AI Act, I had flashbacks to the implementation of the General Data …
Lead Analysts: Jeewan Singh Jalal, Prabhakaran Ravichandhiran and Anand Bodke KnowBe4 Threat Labs recently examined a sophisticated …
While organizations invest heavily in stopping threats from entering their networks, a critical vulnerability often goes underprotected: …
A survey by the World Economic Forum (WEF) found that 47% of organizations cite the advancement of adversarial capabilities as their top …
Scammers stole an estimated $17 billion worth of cryptocurrency in 2025, according to a new report from Chainalysis. Notably, the report …
Attackers are increasingly abusing network misconfigurations to send spoofed phishing emails, according to researchers at Microsoft. This …
Microsoft was the most commonly impersonated brand in phishing attacks during the fourth quarter of 2025, according to researchers at Guardio.…
Researchers at RavenMail warn that a major phishing campaign targeted more than 3,000 organizations last month, primarily in the manufacturing…
WIRED reports that deepfake attacks are impersonating pastors and other religious figures in order to scam congregations.
“Gave me good things to consider that I had not thought about as we move forward and AI becomes a part of our work processes!” …
ClickFix attacks have been around for decades; only the name is new. ClickFix attacks use social engineering to trick users into clicking on …
“It was really good. I liked that it covered a lot of important subjects, focused on how to spot red flags, and used an AI deepfake …
Researchers at Gen warn that a phishing campaign is attempting to trick users into linking malicious devices to their WhatsApp accounts.
Email has been the backbone of business communication for decades and as such, it remains the attacker’s favorite doorway into an organization.
The North Korean threat actor “Kimsuky” is using QR codes to trick users into installing malicious mobile apps, according to security …
In the early hours following reports of a U.S. military operation involving Venezuela, social media feeds were flooded with dramatic images …
Amazon has blocked more than 1,800 suspected North Korean applicants from joining the company since April 2024, TechRadar reports. Amazon’s …
Researchers at Push Security have observed a new variant of the ClickFix attack that combines “OAuth consent phishing with a ClickFix-style …
Over 90% of parked domains now direct users to malicious content, compared to less than 5% a decade ago, according to researchers at Infoblox.
Zscaler has published a report on a new phishing kit dubbed “BlackForce” that uses Man-in-the-Browser (MitB) attacks to steal credentials and …
Eighty-one percent of small businesses suffered a security or data breach over the past year, and 38% of these businesses were forced to raise…
A popular phone call/voicemail scam (i.e., vishing) involves someone calling you, claiming to be law enforcement with a warrant for your …
Today, anyone can find a picture of absolutely anybody and it is also not difficult to find a sample of their voice. By combining these it is …
Lead analysts: Cameron Sweeney, Lucy Gee, Louis Tiley, James Dyer “Super-app” WeChat offers a wealth of functionality—from instant messaging, …
Mexico has taken a major step toward strengthening its digital defenses with the official unveiling of its first National Cybersecurity Plan, …
A phishing campaign is targeting executives with phony offers for awards, according to researchers at Trustwave SpiderLabs. The attackers …
Malwarebytes warns that threat actors are abusing the free Cloudflare Pages service to host phishing portals, helping the phishing sites avoid…
"Good information. Everyone who owns a computer should do this training across the country. It should be mandatory!” "Wow, I had no …
Deepfake attacks have become more compelling and realistic than ever before.
A friend of mine, John D., received this outreach on Threads (see below). At first, he thought it was the standard fake employer scam, but it …
"Good information. Everyone who owns a computer should do this training across the country. It should be mandatory!” "Wow, I had no …
Researchers at CyberProof warn that threat actors are launching phishing attacks via Microsoft Teams' “Chat with Anyone” feature, which lets …
Researchers at SpyCloud have observed a 400% year-over-year increase in successful phishing attacks, with a disproportionate number of attacks…
Threat actors are using the open-source phishing framework Evilginx to target universities across the United States, according to researchers …
ReliaQuest warns that the cybercriminal collective “Scattered Lapsus$ Hunters” appears to be using social engineering attacks to target …
Researchers at Palo Alto Networks’ Unit 42 are tracking two new malicious AI tools, WormGPT 4 and KawaiiGPT, that allow threat actors to craft…
KnowBe4 is proud to announce that three of its leading security products — Security Awareness Training, PhishER/PhishER Plus and Compliance …
Sophisticated online fraud techniques are growing more accessible to unskilled attackers, driven by AI tools and fraud-as-a-service platforms,…
Lead Analysts: Jeewan Singh Jalal, Prabhakaran Ravichandhiran and Anand Bodke Since November 3, 2025, KnowBe4 Threat Labs has been monitoring …
A new criminal platform called “Matrix Push C2” is using browser notifications to launch social engineering attacks, according to researchers …
Following its launch in 2024, Gartner® has now published the second Magic Quadrant™ for Email Security —and KnowBe4 is delighted to once again…
Users should be particularly wary of holiday-themed scams over the next few weeks, according to researchers at Malwarebytes. “Mobile-first …
A large phishing campaign is using phony seasonal party invites to trick users into installing remote management and monitoring (RMM) tools, …
Here's a curious thing about people, sometimes we crave the familiar, and sometimes we demand the novel.
Think about your digital spaces. You’ve got your corporate email, which we all treat a bit like a high-security bank vault. We approach it …
The finance and banking sector across Europe, the Middle East, and Africa (EMEA) faces extraordinary cybersecurity challenges, according to …
In recent weeks, the UK government has announced the introduction of its new Cyber Security and Resilience Bill.
Lead analysts: Louis Tiley, Lucy Gee and James Dyer Between 1:48pm ET on October 29 and 6:53pm ET on October 30, 2025, KnowBe4 threat analysts…
A new report from Entrust warns of an increase in deepfake attacks, which now account for one in five biometric fraud attempts. Additionally, …
Users and organizations should be prepared for a surge in phishing attacks over the next several weeks, as attackers take advantage of the …
Ransomware attacks spiked in October 2025, with more than 700 organizations sustaining attacks, according to a new report from Cyfirma.
Using the right tool for the job is always better. Anyone who does DIY projects around the home knows how using the right tool can …
A new phishing kit is impersonating the Italian IT and web services provider Aruba, according to researchers at Group-IB. The kit is designed …
Researchers at Zimperium are tracking a new malware-as-a-service platform designed to target Android phones with banking Trojans. The …
Organizations rely on KnowBe4 to educate millions of people each month on security awareness and compliance topics, and every October, during …
We’re thrilled to announce KnowBe4 Studios, uniting our world-class creative teams under one powerful brand for our Compliance Plus library. …
Cybereason warns that the Tycoon 2FA phishing kit continues to receive upgrades, allowing unskilled cybercriminals to launch sophisticated …
Researchers at Push Security warn of an extremely convincing ClickFix attack posing as a Cloudflare verification check. ClickFix is a social …
Lead Analysts: Jeewan Singh Jalal, Prabhakaran Ravichandhiran and Anand Bodke KnowBe4 Threat Labs has uncovered an emerging advanced phishing …
AI-fueled cyberattacks are increasingly targeting entities across Africa, according to Robert Lemos at Dark Reading. Lemos cites two recent …
Researchers at Appknox warn that malicious apps are impersonating popular AI tools like ChatGPT and DALL-E to trick users into installing …
A phishing campaign is using invisible characters to evade security filters, according to Jan Kopriva at the SANS Internet Storm Center.
We’re thrilled to announce KnowBe4 Studios, uniting our world-class creative teams under one powerful brand. Leveraging the latest AI …
I received this email the other day to my personal email account. It is a “Security Alert” from “Microsoft Helpdesk.” Oh, my!
A phishing campaign is targeting LastPass users with phony notifications informing users that someone has notified the company of the user’s …
A study from Malwarebytes has found that one in three mobile users has been targeted by an extortion scam, and one in five of these users has …
Human error remains the primary exploitation vector in mobile security incidents, according to Verizon’s latest Mobile Security Index (MSI).
AI maturation is leading to more malicious hacking attacks.
Attackers can more easily introduce malicious data into AI models than previously thought, according to a new study from Antropic. Poisoned AI…
One of the biggest reasons why cybercrime is so bad — and is increasing each year —is that so much of it is committed by foreign nationals who…
Lead Analysts: Lucy Gee and James Dyer Cybercriminals want their payday. Unfortunately for the targets of phishing (and the organizations they…
76% of organizations are struggling to keep up with the sophistication of AI-powered attacks, according to CrowdStrike’s latest State of …
In the complex ecosystem of financial services, some of the greatest threats come from within. While cybersecurity for financial institutions …
The integration of artificial intelligence into the modern workplace represents a paradigm shift in productivity and innovation.
These days it can be hard to tell if something is or isn’t a scam.
Researchers at Bitdefender warn that scams are seeing a steady increase globally. Citing a recent report from the Global Anti-Scam Alliance …
It can happen to the best of us. This story happened a decade ago, when I was working at a Fortune 10 company. “Smartest” is subjective, but …
In late September 2025, several European airports reported significant delays and flight cancellations due to disruptions with their check-in …
A phishing campaign is impersonating Google Careers to target job seekers, according to researchers at Sublime Security.
A phishing campaign is impersonating LastPass and Bitwarden with phony breach notifications, BleepingComputer reports.
In late September 2025, several European airports reported significant delays and flight cancellations due to issues with their check-in and …
Threat actors are abusing X’s generative AI bot Grok to spread phishing links, according to researchers at ESET. The attackers achieve this by…
In the high-stakes world of financial services, trust is the cornerstone of every client relationship. But here's the challenge that keeps …
Cybernews warns that threat actors will likely take advantage of the recent AWS outage to launch phishing attacks against affected users.
A new survey found that 50% of UK residents aged 16 to 34 cite deepfake nudes as their top worry related to AI technology, SecurityBrief …
Ransomware is the gift that keeps on giving… and taking.
Phishing was the initial access vector for 60% of cyberattacks across Europe between July 2024 and June 2025, according to the European Union …
I have been writing about the need to better train our programmers in secure coding practices for decades, most recently here and here.
Google’s Mandiant has published guidance on defending against an ongoing wave of social engineering attacks targeting organizations’ …
The financial services industry operates in one of the most heavily regulated environments in the business world. With sensitive client data …
A new report warns of a significant spike in SMS phishing (smishing) scams targeting younger Americans between 18 and 29 years old.
Job-related scams surged by more than one thousand percent between May and July 2025, according to new research from McAfee.
Deepfakes are easier to create than ever and are being used to attack organizations, families and individuals.
We’ve come a long way. We’ve deconstructed the problem, explored the complexity of humans, and laid out a strategic framework and a practical …
North Korea’s fraudulent IT worker schemes have expanded to target nearly every industry that hires remote employees, according to researchers…
The conversation about AI in cybersecurity is missing the point. While the industry has been focused on the emergence of AI-generated phishing…
OpenAI, the people behind ChatGPT, have launched an updated AI video- and audio-generation system with fascinating, and terrifying, …
Employees who multitask are significantly more vulnerable to phishing attacks, according to a study from the University at Albany published in…
Fighting voice-based phishing needs to be a big part of your human risk management (HRM) plan.
The cybersecurity landscape is undergoing its most dramatic transformation since the dawn of the internet.
If you’re wondering what keeps business leaders up at night, the latest Aon Global Risk Management Survey has a clear answer: cyber attacks …
Microsoft warns that a recent phishing campaign used AI technology to obfuscate its payload and evade security filters.
A new report has found that nearly 40% of security leaders believe their organizations are least prepared for phishing and other social …
October marks Cybersecurity Awareness Month, a perfect reminder that while technology evolves, the greatest threat to organizations often …
Check out the September updates in Compliance Plus so you can stay on top of featured compliance training content.
Welcome back. We have our DEEP framework which was explored in the previous blog post, and discussed in depth in our most recent human risk …
A North Korean threat actor dubbed “DeceptiveDevelopment” is using various social engineering techniques to target job seekers, according to …
A survey by Gartner found that 62% of organizations have been hit by a deepfake attack in the past twelve months, Infosecurity Magazine …
Check out the 44 new pieces of training content added in September, alongside the always fresh content update highlights, new features and …
As cyber threats continue to evolve at breakneck speed, staying ahead of the curve isn't just important, it's essential.
At KnowBe4, everything we do is built on a foundation of innovation and trust. As we bring more artificial intelligence (AI) into our human …
The calendar has flipped into October, so now it’s time to let the Cybersecurity Awareness Month games begin!
In our previous blog post, we discussed the behavioral science behind why people click on malicious links.
Law firms really are under constant pressure to meet tight deadlines, maintain client confidentiality and protect privileged communications.
Welcome back. In our last blog post, we talked about the great divide between tech-focused and people-focused security.
Researchers at Varonis warn of a new phishing automation platform called “SpamGPT” that “combines the power of generative AI with a full suite…
Attackers are abusing AI-powered development platforms like Lovable, Netlify and Vercel to create and host captcha challenge websites as part …
Hackread reports that attackers are abusing Google’s AppSheet platform to send phishing emails.
Let’s be brutally honest. For years, our industry has been locked in a civil war. In one camp, the technologists have been building higher …
North Korean hackers behind the “Contagious Interview” campaign are using the ClickFix social engineering tactic to target job seekers with …
AI-assisted phishing attacks pose a significant and increasing threat to organizations, according to Matt Weidman, partner and vice president…
Protecting humans means protecting the tools humans use.
AI-powered social engineering attacks are significantly more successful than traditional attacks, according to a new report from cyber risk …
Attackers are abusing iCloud Calendar invites to send phishing messages that pose as PayPal notifications, BleepingComputer reports. Since the…
The FBI and the American Bankers Association (ABA) have issued a joint advisory warning of the growing threat posed by AI-generated deepfake …
One of the most common human risk management recommendations is for users to hover over URL links of unexpected messages to see if the …
The use of “shadow AI” is an increasing security risk within organizations, according to a new report from Netskope.
In essence, that is the disclosure and notification message that the open-source developer "qix" sent to the world when he was social …
The State of California’s Franchise Tax Board (FTB) has warned of an ongoing SMS phishing (smishing) campaign targeting residents, …
I occasionally get human risk management (HRM) administrators asking me to help them with ideas of “contests” to better educate their …
Researchers at Stripe warn of a wave of spear phishing attacks targeting C-suite employees and senior leadership across a wide range of …
Healthcare organizations need to be prepared for an increase in AI-assisted phishing attacks, according to Zack Martin, Senior Policy Advisor …
A super common voice phone call phishing scam (i.e., vishing) is when the scammer calls you and pretends to be a law enforcement official with…
Threat actors can now use AI tools to automate entire attack operations, according to a new report from Anthropic.
Many years ago, a friend of mine worked as a security director at a firm and had what they called an “audit box.” It was a pre-prepared box …
Check out the August updates in Compliance Plus so you can stay on top of featured compliance training content.
“The problem is much, much worse than most people acknowledge.” One of the biggest enduring mysteries for me in cybersecurity is why most …
Check out the 19 new pieces of training content added in August, alongside the always fresh content update highlights, new features and events.
Attackers are using a newly discovered phishing-as-a-service (PhaaS) platform dubbed “Salty 2FA” to target a wide range of industries across …
ReliaQuest has published a report on the cybercriminal recruitment ecosystem, finding that fluent English speakers with social engineering …
It’s that exhilarating time of year again! Summer is winding down, and the back-to-school season is in full swing—a truly fantastic time to …
Cybercriminals are increasingly abusing AI-assisted website generators to quickly craft convincing phishing sites, according to researchers at…
Below is an example of a sophisticated survey scam phishing email that KnowBe4’s Threat Lab team has been monitoring as discussed in “The …
You've probably seen them: enticing online offers for free products from brands you trust, like a Yeti beach chair from Costco or an emergency…
Professional phishing groups are targeting customers of brokerage firms in order to manipulate stock prices, KrebsOnSecurity reports. The …
Attackers are using a Japanese Unicode character to replace forward slashes in phishing URLs, BleepingComputer reports.
Social engineering attacks are a growing threat to operational technology (OT) environments, Industrial Cyber reports.
In this series, we first explored the psychology that makes HR phishing so effective, then showcased the real-world lures attackers use to …
Phishing attacks impersonating HR are on the rise. Between January 1 – March 31, 2025, our Threat Lab team observed an 120%surge in these …
We all trust HR - or at least we do when we think they’re emailing us! Data from KnowBe4’s HRM+ platform reveals that phishing simulations …
The North Korean threat actor ScarCruft has incorporated ransomware into its arsenal, according to researchers at South Korean security firm …
Modern Security Operations Centers (SOCs) face a persistent challenge: managing threats across multiple security tools while maintaining operational…
In the never-ending battle against cyber villains, your users are on the front lines.
For any small- to medium-sized enterprise (SME), the cybersecurity landscape can be intimidating. You are informed of a variety of threats, …
For the sixth year in a row, we've been honored with the TrustRadius Tech Cares Award!
In a world so full of digital online scams, it’s hard to remember that scammers abuse our postal mailing systems as well.
The Better Business Bureau (BBB) has warned that scammers are targeting high-profile employees and influencers with fake invitations to appear…
As I reflect on KnowBe4's incredible journey, I'm filled with both pride for how far we've come and excitement for what’s ahead.
Check out the 36 new pieces of training content added in July, alongside the always fresh content update highlights, new features and events.
Check out the July updates in Compliance Plus so you can stay on top of featured compliance training content.
The FBI has issued an advisory warning that scammers are distributing QR code phishing (quishing) links via unsolicited packages sent by snail…
I hear about a ton of similar-sounding scam calls, where the scammer is pretending to be from a service you use (or used), offering you a …
Cybersecurity incidents nearly tripled in the first half of 2025, jumping from 6% in the second half of 2024 to 17% in 2025, according to a …
In today's world, cyberattacks are a constant threat. While technical defenses are crucial, people often remain the easiest attack vector for …
A phishing campaign is targeting Instagram users with phony notifications about failed login attempts, according to researchers at …
ClickFix attacks have been around for decades; only the name is new.
Attackers are using Microsoft Teams calls to trick users into installing the Matanbuchus malware loader, which frequently precedes ransomware …
There is no other way to say it clearer, social engineering is going to be a lot, lot worse soon and far more successful than it is today. And…
The FBI has issued an advisory warning that North Korean IT workers continue to seek fraudulent employment at Western companies.
Most Microsoft 365 users aren’t aware of this recently growing serious email threat vector.
A global retail and wholesale company transformed their security posture after implementing KnowBe4's Phish Alert Button (PAB) and security …
Managing the security gap between your technical defenses and user behavior just got easier!
KnowBe4 is excited to announce that we have been recognized as an overall Customers’ Choice in the July 2025 Gartner Peer Insights Voice of …
Bob Fabien wrote on X: "While some are still paying over a grand for AI courses, the biggest players are giving away high-value resources at …
Ransomware attacks increased by 63% year-over-year in the second quarter of 2025, with a total of 276 publicly disclosed incidents, according …
Africa's cybersecurity landscape presents a paradox: a widespread belief in preparedness among organisations, although significant blind spots…
We’re excited to announce the addition of six new training modules from APIsec University, now available at the Diamond Level in KnowBe4’s …
I’ve been following ransomware since the first one, the AIDS Cop Trojan, was released in December 1989.
More than one in ten people who were targeted by job scams this year fell victim, according to a report from Resume.org.
Scammers are using over 17,000 phony news sites to push investment fraud, according to a new report from CTM360.
The US Federal Trade Commission (FTC) has issued an advisory warning of job scams that impersonate well-known companies with tempting …
We are working tirelessly on our AI First strategy to better protect both humans and their AI tools.
Digital connectivity is reshaping European manufacturing, driving both efficiency and innovation.
Getting through secure email gateways (SEGs) is simply the cost of doing business for a cybercriminal. Literally, detection at the perimeter …
Researchers at Netcraft warn that AI-generated search engine summaries are suggesting phishing sites when users ask them to find legitimate …
The US FBI and cybersecurity experts are warning that the Scattered Spider extortion gang has shifted its focus to the aviation and …
AI is going to allow better, faster, and more pervasive attacks.
Employees are expected to behave securely, and the definition of “securely” is often written down in a myriad of security policies. Yet, …
Author: Bex Bailey Our 2025 Phishing By Industry Benchmarking Report examines why organizations across Asia face some of the highest levels of…
In today's threat landscape, your employees represent both your greatest vulnerability and your strongest defense.
Check out the June updates in Compliance Plus so you can stay on top of featured compliance training content.
A new survey has found that 64% of C-Suite executives in cybersecurity or data center roles view data breaches and ransomware attacks as the …
Check out the 33 new pieces of training content added in June, alongside the always fresh content update highlights, new features and events.
Researchers at Bitdefender warn of a wave of social engineering attacks targeting WhatsApp accounts.
Cybersecurity has long focused on fortifying networks, securing endpoints and blocking malicious code.
Social engineering remains a primary initial access vector for cybercriminals, according to a new report from Europol.
I recently had several conversations about repeat clickers. First with a Forrester analyst and then, shortly after, at KB4-CON Orlando …
I am used to repeating some pretty big numbers when talking about the financial impact of cybercrimes. When you look into the data, it is …
Can it be? Is it true? Two years of KnowBe4 Community!
AI-generated voice deepfakes present an urgent threat to organizations, according to researchers at Pindrop.
Lead Researchers: James Dyer and Louis Tiley Between May 5 and May 7, 2025, KnowBe4 Threat Lab identified a phishing campaign originating from…
In today's rapidly evolving threat landscape, cybercriminals are becoming increasingly sophisticated in their attack methodologies, …
Researchers at Google’s Mandiant have published a report on voice phishing (vishing) attacks, noting that these attacks have served as initial…
Researchers at Google have published a report on the latest scam trends, noting an increase in travel-themed scams targeting people preparing …
There are many things in our lives we must prepare for to be ready. For other things, we wing it, or we're not prepared to deal with it at the…
What is AI really? Throughout this article, I will remove the hype and get to the most honest answer ever.
Researchers at Socure warn of an ongoing wave of employment fraud driven by North Korean IT operatives attempting to secure positions at …
Picture this: it's 2021. You're an IT professional, scrolling through LinkedIn, when a message pings. "Bastion Secure," a new cybersecurity …
Reducing human risk in cybersecurity requires a human-first approach that relies on effective training and practice for people to gain …
OpenAI has published a report looking at AI-enabled malicious activity, noting that threat actors are increasingly using AI tools to assist in…
We’re proud to share that KnowBe4 has once again been recognized as a leader in cybersecurity, receiving multiple 2025 TrustRadius Top Rated …
Researchers at Trellix warn of a spear-phishing campaign that’s targeting CFOs around the world with phony employment offers.
A criminal threat actor tracked as “UNC6040” is using voice phishing (vishing) attacks to compromise organizations’ Salesforce instances, …
When it comes to cybersecurity, organizations face an ever-present and often underestimated threat: human risk.
A KnowBe4 co-worker of mine recently got this SMS phishing message (i.e., smish).
A phishing campaign is targeting European countries with lures themed around copyright infringement, researchers at Cybereason warn.
The FBI is warning that the Silent Ransom Group (SRG) is targeting law firms with IT-themed social engineering attacks and callback phishing …
Last year, KnowBe4's report "Exponential Growth in Cyber Attacks Against Higher Education Institutions" illustrated the growing cyber threats …
Researchers at Certo warn that a new AI chatbot called “Venice[.]ai” can allow cybercriminals to easily generate phishing messages or malware …
Check out the May updates in Compliance Plus so you can stay on top of featured compliance training content.
You know what's interesting about data breaches? Everyone focuses on credit card numbers and financial data, but the reality is that every …
Researchers at IBM Security warn that a major phishing campaign is targeting users in France, incorporating leaked personal data to make the …
Check out the 25 new pieces of training content added in May, alongside the always fresh content update highlights, new features and events.
Cybersecurity experts are warning that scammers are taking advantage of uncertainty surrounding the U.S. administration’s tariff policies, …
The KnowBe4 Threat Lab has identified an active phishing campaign impersonating Capital One.
The FBI is warning that threat actors are impersonating senior US officials in phishing attacks designed to compromise users’ accounts.
Human risk management involves more than security awareness training, but training is a huge part of the mix.
I was once enrolled in a programming module back at university. We had been given a task, to code something, so we all sat banging out …
Since March 2025, the KnowBe4 Threat Labs team has observed a surge in phishing attacks that exploit Google’s AppSheet platform to launch a …
Many organizations, after a period of relative quiet, might believe the ransomware bubble has burst. The headlines may have shifted, and other…
The FBI has issued an alert on a wave of phishing attacks targeting Middle Eastern students who are studying in the US.
I got this Coinbase-related scam in my personal inbox last week.
Commodity phishing kits are increasingly serving dynamically generated phishing pages, according to researchers at ESET.
Agentic AI-enabled ransomware is not here yet, but likely will be very soon. I am talking this year or by 2026.
Business email compromise (BEC) attacks and funds transfer fraud (FTF) accounted for 60% of cyber insurance claims in 2024, according to a new…
When it comes to artificial intelligence (AI) and human risk management (HRM), not all AI is created equal.
Mandiant warns that the Scattered Spider cybercriminal group is using “brazen” social engineering attacks to target large enterprise …
Cybersecurity professionals face an increasingly aggressive phishing threat landscape, and the 2025 KnowBe4 Phishing By Industry Benchmarking …
KnowBe4 ThreatLabs has identified and analyzed a sophisticated cross-platform phishing campaign that utilizes Telegram as its primary …
Just because you’re using a passkey doesn’t mean your password is gone.
Researchers at Cisco Talos warn that major phishing kits continue to incorporate features that allow them to bypass multi-factor …
Phishing was the initial access vector in 50% of attacks during the first quarter of 2025, according to a new report from Cisco Talos.
Researchers at Malwarebytes warn that phishing emails are impersonating the US Social Security Administration (SSA) to trick users into …
Check out the April updates in Compliance Plus so you can stay on top of featured compliance training content.
Check out the 21 new pieces of training content added in April, alongside the always fresh content update highlights, new features and events.
To our valued KnowBe4 customers, partners, and community. I wanted to share some exciting developments happening at KnowBe4.
Recently, I covered a T-Mobile scam where a friend of mine narrowly avoided losing money. In that scam, the attackers called up pretending to …
Email is still the most common attack vector for cyber threats, according to a new report from Barracuda.
Cyberwire wrote: "WIRED has published a report on North Korea's efforts to obtain remote IT positions at foreign companies, noting that these …
Researchers at INKY warn that criminals are impersonating the US Department of Homeland Security to launch phishing scams.
A friend of mine got a call on his phone and he regrettably picked it up. The number was 267-332-3644. The area code is from Bucks County, PA,…
The number of infostealers delivered via phishing emails increased by 84% last year, according to a new report from IBM’s X-Force researchers.…
Ever since Microsoft’s initial announcement on February 13, 2025, about a Russian nation-state phishing campaign using "device code phishing,"…
Scammers are exploiting the death of Pope Francis to launch social engineering attacks, according to researchers at Check Point.
Do your users love The Inside Man? See more of beloved character AJ, now in SecurityCoach!
We're thrilled to announce the launch of KnowBe4 Academy—a comprehensive learning ecosystem designed specifically for security administrators,…
A social engineering campaign is abusing Zoom's remote control feature to take control of victims’ computers and install malware, according to…
A new report from Valimail has found that 50% of organizations lack effective protection against email spoofing.
Recently, I received an email at work from a company with whom I've had previous interactions. The email lacked context and contained an …
According to our independent survey of individuals across the UK, USA, Netherlands, France, Denmark, Sweden, the DACH region, and Africa who …
A new report from Sophos found that ransomware attacks accounted for over 90% of incident response cases involving medium-sized businesses in …
Have you ever walked down a street with broken windows, burnt out cars, graffiti and felt a bit uneasy? There's a reason for that, and it's …
Cybercriminals are increasingly using AI tools to assist in malicious activities, according to Microsoft’s latest Cyber Signals report.
The energy sector stands as a critical pillar of our society. From the electricity powering our homes to the fuel driving our industries, …
Resecurity warns that a China-based cybercriminal gang dubbed the “Smishing Triad” is launching a wave of road toll-themed SMS phishing …
Right now, today, thousands of people are being tricked into going to their banks or credit unions to withdraw large sums of cash and will …
Most organizations cite low security awareness among employees as the biggest barrier to defending against cyberattacks, according to a new …
First QuickBooks, then Microsoft, and now Google—will the hijacking of legitimate third-party platform communications stop escalating in 2025?…
In today's cybersecurity landscape, organizations face an ever-present and often underestimated threat: human risk. Despite significant …
Researchers at Hoxhunt have found that AI agents can now outperform humans at creating convincing phishing campaigns.
Phishing was the most prevalent and disruptive type of attack experienced by UK organizations over the past twelve months, according to the …
America's critical infrastructure faces an unprecedented threat, and it's already installed in hundreds of locations across the nation.
Cybercriminals are capitalizing on tax season by launching phishing campaigns targeting QuickBooksusers, Malwarebytes reports.
Reliable energy is the backbone of any modern society. It powers our homes, industries, and economies. But what happens when this essential …
Cybercriminals are quick to exploit seasonal events — and tax season is no exception. It’s a yearly honeypot for cybercriminals, who take …
Disclaimer: Don't get me wrong, I love using generative AI daily for research and writing. This is about how other users could be using it …
Illumio’s recent Global Cost of Ransomware Study found that 64% of Australian companies hit by ransomware had to shut down operations as a …
On March 6, I had the opportunity to speak and provide testimony at the SEC Investor Advisory Committee’s panel on Retail Investor Fraud in …
With this week being Identity Management Day on April 8th, it's the perfect reminder for organizations to focus on protecting their employees'…
The Russian threat actor Gamaredon is targeting Ukrainians with spear-phishing documents related to troop movements, according to researchers …
North Korea’s fraudulent employment operations have expanded to hit countries around the world, with a particular focus on Europe, according …
When it comes to secure email gateways (SEGs), the narrative is quite simple. For years, organizations have relied on SEGs as the foundation …
Check out the March updates in Compliance Plus so you can stay on top of featured compliance training content.
A phishing-as-a-service (PhaaS) platform dubbed ‘Lucid’ is driving a surge in SMS phishing (smishing) attacks, according to researchers at …
Steam was the most impersonated brand in phishing attacks during the first quarter of 2025, according to a new report from Guardio. The …
Check out the 58 new pieces of training content added in March, alongside the always fresh content update highlights, new features and events.
Phishing attacks are driving a surge in “double brokering” scams in the shipping industry, according to Christian Reilly, Cloudflare’s Field …
Attackers are using new tactics in QR code phishing (quishing) attacks, according to researchers at Palo Alto Networks’ Unit 42.
Internet memes and viral content have become a universal language of online culture. They're easily shareable, often humorous, and can spread …
It seems like only yesterday that we launched the Compliance Plus training library as a result of customers asking us to address their needs …
The Network and Information Systems Directive 2022 (NIS2) was designed to strengthen the cybersecurity resilience of critical infrastructure …
As of January 17, 2025, the Digital Operational Resilience Act (DORA) came into force across all European Union member states, with the …
99% of phishing emails that reached inboxes last year did not contain malware, according to a new report from Fortra.
INKY has published its annual report on email security, finding that phishing accounted for 30% of all reported cybercrimes last year.
A KnowBe4 Threat Lab PublicationAuthors: By James Dyer, Threat Intelligence Lead at KnowBe4 and Lucy Gee, Cybersecurity Threat Researcher at …
The average amount of money requested in business email compromise (BEC) attacks spiked to $128,980 in the fourth quarter of 2024, according …
We recently conducted research in Denmark and Sweden to understand security culture in local organizations better.
Phishing-as-a-service (PhaaS) platforms drove a surge in phishing attacks in the first two months of 2025, according to researchers at …
In today’s world, cybersecurity is more critical than ever. Organizations and individuals alike face a constant barrage of cyber threats, and …
Bitdefender warns that a major ad fraud campaign in the Google Play Store resulted in more than 60 million downloads of malicious apps.
Our latest Phishing Threat Trends Report explores the evolving phishing landscape in 2025, from renewed tactics to emerging attack techniques.
There are thousands of people worldwide trying to scam you, hoping they can make you a victim, steal your money, and harm you in some way. …
Threat actors are abusing Microsoft’s infrastructure to launch phishing attacks that can bypass security measures, according to researchers at…
Business email compromise (BEC) attacks rose 13% last month, with the average requested wire transfer increasing to $39,315, according to a …
My two previous recent postings on AI covered “Agentic AI” and how that impacts cybersecurity and the eventual emergence of malicious agentic …
Our recent research reveals a concerning discrepancy between employees' confidence in their ability to identify social engineering attempts …
A phishing campaign is impersonating travel agency Booking.com to target employees in the hospitality industry, according to researchers at …
A KnowBe4 Threat Lab publicationAuthors: Martin Kraemer, Jeewan Singh Jalal, Anand Bodke, and James Dyer EXECUTIVE SUMMARY: We observed a 98% …
Group-IB has published a report on SIM swapping attacks, finding that attackers continue to use social engineering to bypass technical …
I infrequently get emails from customers who are frustrated because their employer sent out some legitimate mass email to all employees that …
A KnowBe4 Threat Labs PublicationAuthors: James Dyer and Cameron Sweeney The KnowBe4 Threat Research team has observed a sustained increase in…
Artificial Intelligence (AI) is no longer just a tool—it is a game changer in our lives, our work as well as in both cybersecurity and …
Microsoft warns that a widespread malvertising campaign hit nearly one million devices around the world. The campaign, which began on illegal …
The U.S. Justice Department has charged ten Chinese nationals for acting as hackers-for-hire for the Chinese government.
In the realm of cybersecurity, perception often diverges from reality. A common misconception is that nation-state cybercriminals primarily …
I’ve been in the cybersecurity industry for over 36 years. Surprisingly, hackers and malware haven't changed all that much.
Check out the February updates in Compliance Plus so you can stay on top of featured compliance training content.
Check out the 58 new pieces of training content added in February, alongside the always fresh content update highlights, new features and …
Researchers at Barracuda observed a fourfold increase in ransomware threats last year, driven by increasingly sophisticated …
Ever since OpenAI publicly released ChatGPT in late 2022, people have been predicting the end of programmers.
A KnowBe4 Threat Lab PublicationAuthors: Martin Kraemer, James Dyer, and Lucy Gee Much like sending a phishing email from a compromised …
The European Union's AI Act is ushering in a new era of workplace requirements, with AI literacy taking center stage. Under Article 4, …
A new report from Arctic Wolf has found that 96% of ransomware attacks now involve data theft as criminals seek to force victims to pay up.
Researchers at Juniper Threat Labs warn that phishing attacks are utilizing a new obfuscation technique to hide malicious JavaScript.
Recently, Dr. Martin J. Kraemer, Security Awareness Advocate at KnowBe4, and Dr. William Seymour, Lecturer in Cybersecurity at King’s College …
If you haven’t been paying attention closely enough, a new type of access control token, like a super browser token on steroids, is becoming …
A KnowBe4 Threat Lab PublicationAuthors: Jeewan Singh Jalal, Anand Bodke, Daniel Netto and Martin Kraemer
We are very excited to announce the addition of audiocasts, a new content type now available in the ModStore to help strengthen your security …
ESET warns of a wave of phishing attacks informing employees that they’ve been fired or let go. The emails are designed to make the user panic…
Zimperium warns of a surge in phishing attacks specifically tailored for mobile devices. These attacks are designed to evade desktop security …
KnowBe4 has been recognized in G2’s 2025 Best Software Awards, earning the top spot as the #1 Security Product and ranking #2 Overall Software…
A Chinese government-backed hacking group is using fake medical software to compromise hospital patients' computers, infecting them with …
Researchers at ReliaQuest have published a report on a phishing breach in the manufacturing sector that went from initial access to lateral …
It's no surprise that 18–29-year-olds are turning to social media for cybersecurity information. As digital natives, this age group naturally …
Several Russian state-sponsored threat actors are using QR code phishing (quishing) to compromise Signal accounts, according to researchers at…
You would think with all the global press we have received because of our public announcement of how we mistakenly hired a North Korean fake …
Researchers at Cyble warn that a phishing kit is abusing the Open Graph (OG) protocol to target social media users.
Phishing and malicious emails remained the primary vectors of infection during the second half of 2024, according to a new report from Acronis.
Spear phishing was the top cybersecurity threat to the manufacturing sector over the past six months, according to a report from ReliaQuest. …
At KnowBe4, we constantly strive to stay ahead of emerging threats and create training content to warn users about the latest tactics used by …
Several Russian threat actors, including the SVR’s Cozy Bear, are launching highly targeted spear phishing attacks against Microsoft 365 …
Authors: Martin Kraemer, Security Awareness Advocate at KnowBe4 and James Dyer, Threat Intelligence Lead at KnowBe4 This Valentine’s Day, …
Data theft extortion attacks increased by 46% in the fourth quarter of 2024, according to a new report from Nuspire.
I'm doing a quick poll because I find myself exactly where Sam is. But I would love to understand how that is for us IT pros here. Hence.. a …
SentinelOne warns that a phishing campaign is targeting high-profile X accounts, including those belonging to US political figures, leading …
Check Point warns that a large-scale phishing campaign is targeting Facebook accounts with phony copyright infringement notices.
2024 saw the highest-ever amount of ransomware attacks, according to a new report from NCC Group.
Dr. Martin J. Kraemer discusses learning from The Word Economics Forum Cybersecurity Outlook 2025 report Last year, the British multinational …
In the bustling world of 1960s Madison Avenue, a young advertising executive named Lester Wunderman was about to revolutionize the industry. …
Scammers are taking advantage of the newfound popularity of the China-based AI app DeepSeek, according to researchers at ESET.
A KnowBe4 Threat Lab publicationAuthors: Daniel Netto, Jeewan Singh Jalal, Anand Bodke, and Martin Kraemer
The rise of agentic AI tools will transform the cybercrime landscape, according to a new report from Malwarebytes.
Recently, I started working with my children's school to enhance their online safety measures and develop a digital mindfulness course in …
Nearly half (46%) of businesses observed an increase in deepfakes and generative AI-related fraud last year, a new report from AuthenticID has…
Researchers at Cisco Talos warn that a new phishing campaign is targeting users in Germany and Poland in an attempt to deliver several strains…
Check out the January updates in Compliance Plus so you can stay on top of featured compliance training content.
Check out the 25 new pieces of training content added in January, alongside the always fresh content update highlights, new features and …
Researchers at Zimperium warn that a large phishing campaign is impersonating the US Postal Service (USPS) to target mobile devices with …
Our recent Africa Cybersecurity Awareness survey has revealed a startling surge in cybersecurity concerns among African users, with 58% of …
A KnowBe4 Threat Lab PublicationAuthors: Jeewan Singh Jalal, Anand Bodke, and Martin Kraemer
Microsoft, Apple, and Google were the most commonly impersonated brands in phishing attacks last quarter, according to researchers at Check …
Deepfakes are no longer just the stuff of sci-fi thrillers—they’re here, and they’re deceptively good. From celebrity endorsements to …
AI is advancing at lightning speed, but it’s also raising some big questions, especially when it comes to security. The latest AI making …
Drivers across the U.S. are being bombarded with fraudulent text messages claiming to come from toll operators like E-ZPass.
73% of educational institutions in the UK have sustained at least one cyberattack or breach in the past five years, according to researchers …
Phishing attacks are the most common security issue for smartphone users, according to a new study by Omdia.
A new survey by cybersecurity vendor Netwrix found that 84% of healthcare organizations spotted a cyberattack in the past twelve months, with …
Human risk management (HRM) is now the primary approach to addressing the ongoing need for strong security cultures in organizations of all …
The Russian threat actor “Star Blizzard” has launched a spear-phishing campaign attempting to compromise WhatsApp accounts, according to …
Researchers at Malwarebytes are tracking a major malvertising campaign that’s abusing Google Ads to target individuals and businesses …
Threat actors are abusing Google Translate’s redirect feature to craft phishing links that appear to belong to, according to researchers at …
An SMS phishing (smishing) campaign is attempting to trick Apple device users into disabling measures designed to protect them against …
Interpol has recently recommended discontinuing the use of the term "Pig Butchering" in cybercrime discussions, expressing concern that such …
Social engineering and phishing are involved in 70% - 90% of data breaches. No other root cause of malicious hacking (e.g., unpatched software…
Check out the December updates in Compliance Plus so you can stay on top of featured compliance training content.
Ransomware groups claimed responsibility for 5,461 attacks in 2024, with 1,204 of these attacks being publicly confirmed by victim …
I have helped people detect romance scams for decades. It is still very common for romance scammers to leverage both pictures of celebrities …
In cybersecurity, email has always been a critical concern. However, we feel the new 2024 Gartner® Magic Quadrant for Email Security …
Check out the 52 new pieces of training content added in December, alongside the always fresh content update highlights, new features and …
Japan’s National Police Agency (NPA) has attributed more than 200 cyber incidents over the past five years to the China-aligned threat actor …
The UK government decided to wage war on explicit deepfakes. About time, right? But before we start celebrating, let's take a closer look.
A phishing campaign is abusing Microsoft 365 test domains to send legitimate payment requests from PayPal, according to Fortinet’s CISO Dr. …
Researchers at SlashNext warn that cybercriminals are using a WordPress plugin called “PhishWP” to spoof payment pages and steal financial …
Kim S. Nash, the Deputy Bureau Chief at the Wall Street Journal who owns the cybersecurity beat wrote in her newsletter today: "Forget trade …
A phishing campaign is targeting users with phony offers to beta test new video games, according to researchers at Malwarebytes.
Credential phishing attacks surged by 703% in the second half of 2024, according to a report by SlashNext. Phishing attacks overall saw a 202%…
Securonix warns that tax-themed phishing emails are attempting to deliver malware via Microsoft Management Console (MSC) files.
The Federal Trade Commission (FTC) has issued an urgent warning about a surge in immigration scams targeting immigrants and their families on …
Trend Micro warns that the Russian state-sponsored threat actor Earth Koshchei (also known as “APT29” or “Cozy Bear”) is using spear phishing …
KnowBe4 is a big believer in focusing on decreasing human risk as the best way to decrease cybersecurity risk in most environments.
A threat actor is abusing HubSpot’s Free Form Builder service to craft credential-harvesting phishing pages, according to Palo Alto Networks’ …
There is a type of scam where victims are contacted by someone fraudulently posing as a popular trusted entity (e.g., Amazon, U.S. Post …
ESET has published its threat report for the second half of 2024, outlining a new social engineering tactic targeting mobile banking users.
Some of our customers are reporting “Threat Alerts” from Mimecast stating hackers have exploited KnowBe4 or KnowBe4 domains to send email …
Cybersecurity researchers are warning about a new breed of investment scam that combines AI-powered video testimonials, social media …
An email phishing campaign is targeting popular YouTube creators with phony collaboration offers, according to researchers at CloudSEK. The …
Threat actors are using voice phishing (vishing) attacks via Microsoft Teams in an attempt to trick victims into installing the DarkGate …
The U.S. Justice Department revealed indictments against 14 North Korean nationals for their involvement in a long-running scheme designed to …
Ransomware attacks targeting utilities have surged by 42% over the past year, with spear phishing playing a major role in 81% of cases, …
A new report makes it clear that U.K. organizations need to do more security awareness training to ensure their employees don’t fall victim to…
A widespread phishing campaign is attempting to steal credentials from employees working at dozens of organizations around the world, …
Researchers at Zimperium warn that a phishing campaign is targeting Android phones to deliver the Antidot banking trojan.
For decades, we have all been warned to be appropriately skeptical of internet search engine results. Sadly, most people are not.
A new report from Hornetsecurity has found that 427.8 million emails received by businesses in 2024 contained malicious content.
Researchers at Silent Push warn that a phishing campaign is using malicious Google Ads to conduct payroll redirect scams.
New analysis of ransomware attacks shows that phishing is the primary delivery method and organizations need to offer more effective security …
Check out the November updates in Compliance Plus so you can stay on top of featured compliance training content.
In recent years, the world of cybersecurity has witnessed a concerning trend: a significant increase in phishing attacks.
The US Internal Revenue Service (IRS) has issued an advisory warning taxpayers to be on the lookout for holiday-themed shopping scams.
Frequently, when a cybersecurity training manager sends out a controversial simulated phishing attack message that angers a bunch of employees…
It is the holiday season. Think twinkling lights, the scent of pine, and cyber threats lurking in the shadows, waiting to pounce quicker than …
The US Federal Bureau of Investigation (FBI) warns that threat actors are increasingly using generative AI to increase the persuasiveness of …
Check out the 84 new pieces of training content added in November, alongside the always fresh content update highlights, events and new …
Scammers are abusing Google ads to target users searching for help with printer problems, according to researchers at Malwarebytes.
The latest data on brand phishing trends shows one brand dominating quarter over quarter, but also continuing to take on a larger share of the…
It’s been several weeks since the exciting premiere of The Inside Man - Season 6 in St. Petersburg, Fl. If you missed my post, I talked about …
Researchers at Trend Micro warn that the China-aligned threat actor Earth Kasha has launched a new spear phishing campaign targeting …
Cybercriminals are constantly evolving their tactics to exploit our vulnerabilities. A recent phishing campaign has taken this to a new low, …
Technological advances in artificial intelligence (AI) are only making the ongoing problem of social engineering worse.
Researchers at McAfee warn of a surge in malicious loan apps targeting Android users across South America, Southern Asia, and Africa.
A new survey of hackers shows that AI is not only empowering hackers to be more effective, but that AI itself is “ripe for exploitation.”
We are excited to see the Cybersecurity Infrastructure Security Agency (CISA) and outgoing Director Jen Easterly strongly recommend …
Three out of four Black Friday-themed spam emails are scams, according to researchers at Bitdefender. Most of these scams are targeting users …
You do not want to miss this one! You can now see our AI Defense Agents (AIDA) live in a demo, now that they are released. Customers can now …
Researchers at EclecticIQ warn that the financially motivated Chinese threat actor “SilkSpecter” has launched a phishing campaign targeting …
Analysis of a new phishing attack highlight just how easy it can be to spot these kinds of attacks if recipients were properly educated.
Phishing emails are increasingly using Scalable Vector Graphics (SVG) attachments to display malicious forms or deliver malware, …
The threat group FIN7 is using the lure of generating nude images of favorite celebrities to get victims to download their NetSupport RAT.
A phishing campaign is impersonating HR to target employees who are making annual insurance changes during the open enrollment period, …
The Association of Certified Fraud Examiners (ACFE) recently released a report Occupational Fraud 2024: A Report to the Nations, where they …
A new and concerning cybersecurity trend has emerged. According to the latest Q3 2024 Cato CTRL SASE Threat Report from Cato Networks, …
The newly released single largest analysis of cyber attacks across all of 2023 show a strong tie between the use of phishing and techniques …
About five years ago, I was having trouble with an expensive brand-name refrigerator that my wife and I had bought. It was a great …
As the holiday shopping season kicks into high gear, cybercriminals are gearing up too. This year, alongside the usual suspects, we're seeing …
The Swiss National Cyber Security Centre (NCSC) has warned of a QR code phishing (quishing) campaign that’s targeting people in Switzerland …
Cybersecurity threats grow more sophisticated by the day. Amid this constant change, one truth remains: people are simultaneously our greatest…
In my most recent book, Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing, I highlight the use of “champions,"…
KnowBe4, the leading platform for security awareness training, is excited to bring the award-winning original series, "The Inside Man,” back …
Threat actors are exploiting Microsoft Visio files and SharePoint to launch two-step phishing attacks, according to researchers at Perception …
New data shows just how crippling ransomware has been on small businesses that have fallen victim to an attack and needed to pay the ransom.
We’re thrilled to announce the long-awaited sixth season of the award-winning KnowBe4 Original Series - “The Inside Man” is now available in …
In the ever-evolving landscape of cybersecurity, the convergence of Artificial Intelligence (AI) and Open-Source Intelligence (OSINT) has …
Researchers at IBM X-Force are tracking a phishing campaign by the criminal threat actor “Hive0145” that’s using stolen invoice notifications …
A new report from ESET has found that most nation-state threat actors rely on spear phishing as a primary initial access technique.
Learn how to step-by-step create your first realistic deepfake video in a few minutes.
Isn’t it typical for bad actors to strike when we’re distracted and busy during this time of year?
Researchers at Malwarebytes warn that cybercriminals are using search engine poisoning to boost phishing pages to the top of Bing’s search …
Cybercriminals are using artificial intelligence (AI) and generative AI in open source intelligence (OSINT) activities to target your …
The latest trend in cybercrime is that attackers don't really focus on “hacking” in; they’re logging in.
Cybercriminals are impersonating OpenAI in a widespread phishing campaign designed to trick users into handing over financial information. The…
As society grapples with the rapid advancement of AI and synthetic media, we've been asking the wrong question. The focus on whether content …
Threat actors are abusing DocuSign’s API to send phony invoices that appear “strikingly authentic,” according to researchers at Wallarm.
Tick tock, the countdown is on! KB4-CON APJ starts in just 10 days, and you still have time to register!
ReliaQuest warns that the BlackBasta ransomware gang is using new social engineering tactics to obtain initial access within corporate networks.
Attackers are abusing Eventbrite’s scheduling platform to send phishing emails, according to researchers at Perception Point. These attacks …
When you think of KnowBe4, you might immediately picture phishing simulations, password security modules, or other security awareness training…
Over a decade ago, I noticed that social engineering was the primary cause for all malicious hacking. It has been that way since the beginning…
Check out the October updates in Compliance Plus so you can stay on top of featured compliance training content.
In the ever-evolving landscape of cybersecurity threats, we've recently encountered a sophisticated phishing attempt targeting one of our …
Cybersecurity is all about risk management and reduction. You cannot get rid of all risk. Well, I guess you could, but you (and everyone else)…
Chief Information Security Officers (CISOs) are facing unprecedented challenges. The combination of increasingly sophisticated cyber threats, …
Threat actors are targeting people who have recently lost their jobs with employment scams on LinkedIn, according to researchers at …
Check out the 60 new pieces of training content added in October, alongside the always fresh content update highlights, events and new features.
Sophos describes a QR code phishing (quishing) campaign that targeted its employees in an attempt to steal information.
As generative AI evolves and becomes a mainstream part of cyber attacks, new data reveals that deepfakes are leading the way.
Halloween-themed spam and phishing emails have surged over the past two months, with a significant increase beginning in October, according to…
Analysis of phishing emails in the second quarter of this year paints a picture of what security teams and vigilant recipients should expect …
Phishing remains a top initial access vector for cyberattacks, according to researchers at Cisco Talos.
Cybercriminals are offering tools to help phishing pages avoid detection by security tools, according to researchers at SlashNext.
A recent report from UK Finance covered by the BBC paints a concerning picture of the evolving landscape of financial fraud. With a 16% rise …
Despite the belief that today’s SOC should be doing the lion’s share of protecting an organization, new data shows reliance on more than just …
European Organizations Can't Afford to Wait: Critical Cybersecurity Threats Demand Immediate Action
A recent analysis of the ransomware group Meow raises the notion that groups are evolving from using encryption as a tactic to more profitable…
Researchers at Trustwave observed a 140% increase in callback phishing attacks between July and September 2024. Callback phishing is a social …
Action Fraud, the UK’s national fraud and cyber crime reporting service, warns that more than 33,000 people have reported that their online …
Sixty-four percent of IT leaders have clicked on phishing links, a new survey by Arctic Wolf has found. Despite this, 80% of these same …
It's October 10th, 2024, and I've just stepped out of KB4-CON EMEA, my head buzzing with insights and my notebook filled with scribbles. I …
With 16+ billion mobile devices in use worldwide, new data sheds light on how cyber attackers are shifting focus and tactics to put attacks …
New York City's iconic Barnes & Noble on 5th Avenue recently featured the newly released books of two of KnowBe4's leading cybersecurity …
KnowBe4 was asked what changes were made in the hiring process after the North Korean (DPRK) fake IT worker discovery. Here is the summary and…
The U.S. FBI warns that scammers are attempting to trick law firms into transferring money as part of a phony debt collection scheme.
Microsoft warns that threat actors are abusing legitimate file-hosting services to launch phishing attacks. These attacks are more likely to …
In a shocking turn of events, an unnamed company based in the UK has fallen victim to a sophisticated cyber attack after inadvertently hiring …
AI is quickly becoming the basis for more cyber attacks, leading organizations to realize the risk it presents. A new report now shows that …
OpenAI has disclosed that its employees were targeted by spear-phishing attacks launched by a suspected Chinese state-sponsored threat actor.
New research shows that less malicious emails are getting past security scanners to the inbox, but also provides details about how phishing …
A North Korean threat actor is launching social engineering attacks against job seekers in the tech industry, according to researchers at Palo…
We are excited to announce that KnowBe4 has been named a leader in the Fall 2024 G2 Grid Report for Security Orchestration, Automation, and …
We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) …
It was a Saturday morning, and I had grand plans. By "grand plans," I mean sitting on the sofa, watching reruns of "The IT Crowd," and …
As ransomware becomes more pervasive, new data provides insight into how well organizations are responding and the attack vector being used …
Depending on who you ask, between 70 and 90 percent of cyber risk has human error as the root cause. That's why Human Risk Management (HRM) is…
A partnering of European and Latin American law enforcement agencies took down the group behind the mobile phone credential theft of 483,000 …
We live in a world where, despite the sharing of information online, we feel like those interactions will never reach home. But a new scam – …
The Trinity ransomware gang is launching double-extortion attacks against organizations in the healthcare sector, according to an advisory …
Cybercriminals have found a new way of leveraging legitimate web services for malicious purposes, this time with the benefit of added …
As the recent hurricane Helene caused major damage and as hurricane Milton is expected to make landfall in Florida soon, deepfakes are …
Attackers continue to exploit URL rewriting to hide their phishing links from email security filters, according to researchers at Abnormal …
As remote work and connecting while traveling has become the norm, mobile device security responsibilities have also increased.
A free phishing-as-a-service (PhaaS) platform named Sniper Dz has assisted in the creation of more than 140,000 phishing sites over the past …
During World War II, a group of brilliant minds led by Alan Turing gathered at Bletchley Park in England to crack the German Enigma code. This…
Organizations around the world are unknowingly recruiting and hiring fake employees and contractors from North Korea. These sophisticated …
Industry analysis of the domains used behind phishing and brand impersonation attacks show financial institutions are being leveraged at an …
New research by Recorded Future provides insight into how advanced and sophisticated the threat group Marko Polo has become since launching in…
This recent article on how a hacker used genealogy websites to help better guess victims' password reset answers made it a great time to share…
A new “so-phish-ticated” attack uses phone calls, social engineering, lookalike domains, and impersonated company VPN sites to gain initial …
Researchers at Todyl have published a report on a major cybercriminal group that’s conducting business email compromise (BEC) attacks against …
The U.K.’s National Cyber Security Centre (NCSC) and the U.S. FBI have released an advisory warning of Iranian state-sponsored spear-phishing …
The recent cyber attack on Dick's Sporting Goods makes it clear that email played a critical role and emphasizes the need for better security …
When Walt Disney first unveiled the Magic Kingdom, he made a decision that would revolutionize theme park design - and inadvertently offer a …
In an era where technology continues to blur the lines between reality and fiction, a recent incident involving U.S. Senator Ben Cardin serves…
The criminal prosecution of the threat actors behind the "OTP Agency" has highlighted an ingenious new tactic that cybercriminals can use to …
Yubico has published a survey of 20,000 people from 10 countries around the world, finding that 40% of respondents have never received …
In a world where cybersecurity incidents are no longer a matter of if they will happen, but when, having a solid incident response plan is a …
The number of ransomware attacks around the world increased by 73% in 2023, according to a new report by the Institute for Security and …
Check out the September updates in Compliance Plus so you can stay on top of featured compliance training content.
Once upon a time, security awareness training resembled a never-ending game of Tetris. Threats cascaded down, demanding swift action and …
Netcraft warns that scammers are posting QR code stickers on parking meters in the UK and other European countries.
Check out the 40 new pieces of training content added in September, alongside the always fresh content update highlights, events and new …
Artificial intelligence (AI) is revolutionizing most, if not all, industries worldwide. AI systems use complex algorithms and large datasets …
Researchers at ReliaQuest have published a report looking at cyber threats surrounding the upcoming US presidential election, warning that …
A new wave of concern has surfaced around the security of Automated Tank Gauges (ATGs), critical systems that monitor and manage liquid levels…
AI and AI-generated deepfakes are proving to be the most intriguing, and in some ways troubling, recent advances in technology.
A phishing campaign is targeting GitHub users with phony CAPTCHA pages, according to researchers at McAfee. The phishing emails ask users to …
Threat actors are abusing virtual shopping lists to trick Walmart customers into transferring money or disclosing personal information, …
New analysis of attacks on the financial sector shows that the combination of phishing emails and compromised credentials is a recurring — and…
Since the beginning of computers, social engineering has been the number one way that computers and networks have been compromised. Social …
Analysis of typosquatting and brand impersonation activity across 500 of the most visited domains provides insight in to how these techniques …
New analysis of blockchain activity shows scammers are needing less time to obtain crypto payments and are seeing higher payoffs per scam.
Researchers at Barracuda have observed an increase in phishing attacks that abuse popular content creation and collaboration platforms. These …
Analyst reports aim to provide market insights. But when it comes to Human Risk Management (HRM), we’ve noticed that they often fall short of …
We are halfway through our annual The Inside Man Biggest Fan Contest, and we already have some amazing entries! Encourage your users to get …
The U.S. Justice Department has indicted a Chinese national, Song Wu, for allegedly sending spear phishing emails to employees at various U.S.…
As a valued KnowBe4 customer and partner, we're thrilled to bring you exciting news about our upcoming KB4-CON EMEA 2024 in London.
Researchers at ReversingLabs warn that North Korea’s Lazarus Group is targeting software developers with phony job interviews.
Increased ransomware attacks on industrial control systems (ICS), mixed with general ICS insecurity found across the manufacturing sector, has…
Statista projects that the total cost of cybercrime will increase from $6.4 trillion between 2024 and 2029, reaching a staggering $15.63 …
Phishing Attack Takes a Two-Step Approach to Leverage Legitimate Sites and Evade Detection. [4-Minute Survey] Share Your …
Mark Shepherd, the Inside Man, is on a mission.
The latest evolution of the ransomware service model, RansomHub, has only been around since February of this year, but its affiliates are …
Business email compromise (BEC) attacks have caused more than $55 billion in losses between 2013 and 2023, according to an advisory from the …
Can you help me with your input? I'd love your thoughts about AI in InfoSec. This is a super short survey that asks about any AI tools you use…
Research from The Financial Ombudsman Service, a U.K. based organization dedicated to helping citizens with free financial advice, has found …
Researchers at Palo Alto Networks’ Unit 42 warn that attackers are using refresh entries in HTTP response headers to automatically redirect …
Researchers at Bitdefender warn that law firms are high-value targets for ransomware gangs and other criminal threat actors. Attackers …
South Africa’s cybersecurity workforce shortage mirrors global trends, but also faces local factors like underinvestment in basic education, …
The Better Business Bureau (BBB) has observed a six-fold increase in losses from investment scams over the past three years. The BBB has …
In July 2024, KnowBe4 revealed that we had unknowingly hired a North Korean who was pretending to be someone else. We locked down the laptop …
Researchers at Malwarebytes warn of a surge in election-themed scams ahead of November’s presidential election in the US. These attacks can be…
Threat actors are opting for malicious links over attachments in email-based attacks because it gives them a critical advantage that many …
Analysis of a new phishing attack demonstrates how attackers may take a longer path to reach their malicious goals while staying “under the …
A new attack runs slow and steady, focused on compromising large manufacturing companies using contextual social engineering to trick victims …
Phishing remains a top initial access vector for threat actors, according to researchers at ReliaQuest. Phishing and other social engineering …
The availability of deepfake technology has given threat actors a valuable tool for social engineering attacks, according to researchers at …
In cybersecurity, technology often takes center stage. From the latest AI-driven defenses to sophisticated encryption techniques, it's easy to…
A social engineering campaign is targeting entities in the Middle East using malware that impersonates Palo Alto Networks’ GlobalProtect VPN, …
Researchers at Palo Alto Networks’ Unit 42 are tracking dozens of scam campaigns that are using deepfake videos to impersonate CEOs, news …
Check out the August updates in Compliance Plus so you can stay on top of featured compliance training content.
In a new low for cybercriminals, a new scam attempts to take advantage of those grieving the loss of a loved one, and charges their credit …
New data exposes the reality of ransomware attacks today, including their frequency, impact, ransom payment – and the involvement of human …
Researchers at Netskope last month observed a 2000-fold increase in traffic to phishing pages delivered through Microsoft Sway.
New analysis of current ransomware attacks shows a massive focus on U.S. organizations, with growth spread across nearly every industry.
Check out the 29 new pieces of training content added in August, alongside the always fresh content update highlights, events and new features.
Analysis of cryptocurrency payments made on the blockchain highlights shifts in the size and frequency of ransomware attacks and may paint a …
Researchers at Meta have published details on Iranian spear-phishing attacks targeting WhatsApp accounts. The activity is attributed to APT42,…
New analysis of Q2 threats shows a consistent pattern of behavior on the part of threat actors and threat groups, providing organizations with…
Threat actors are increasingly tailoring their attacks to target social media apps and smartphone users, according to a new report from the …
This blog was co-written by Perry Carpenter and Roger A. Grimes. As I sit in the 2024 Seattle Convene conference this week and listen to …
Thirty-four percent of state and local government entities were hit by ransomware in 2024, a new report from Sophos has found. While this is a…
Can you believe it’s already back-to-school time for many? Where has the summer gone?
New research on email threats points to AI-based tools to assist in generating BEC content. And the overwhelming targeted role may or may not …
New data shows the most prevalent and obvious path into an organization – email – continues to be exploited by a growing number of …
A malvertising campaign is abusing Google ads to impersonate Google’s entire product line, according to researchers at Malwarebytes. The …
As artificial intelligence (AI) technology advances, its influence on social media has become more and more pervasive and riddled with …
Researchers at Recorded Future’s Insikt Group warn that the Iranian state-sponsored threat actor “GreenCharlie” is launching spear phishing …
Analysis of a phishing campaign targeting thousands of government contractors, dubbed “Operation Uncle Sam,” takes advantage of some …
Threat actors are abusing a technique called “URL rewriting” to hide their phishing links from security filters, according to researchers at …
As Europe is returning from summer breaks, it is time to reflect on the first half of 2024 and look forward to the rest of the year.
When it comes to the duration of a ransomware attack and the subsequent recovery process, the numbers are staggering and vary wildly. Partly …
Highlights from a new survey focused on employee compliance reveals just how targeted and susceptible U.K. businesses are to phishing attempts.
The ransomware threat group formerly known as "Royal" has rebranded itself as BlackSuit and updated their attack methods, warns the FBI.
Recently, we had a customer reach out to ask if disabling clickable uniform resource locator (URL) links in emails was enough protection by …
Heads-up: I just proved that unsuspecting call recipients are super vulnerable to AI vishing
File-sharing phishing attacks have skyrocketed over the past year, according to a new report from Abnormal Security.
The latest data from Coveware shows a slowing of attack efficacy, a decrease in ransom payments being made, and a shift in initial access …
Cross-Site Scripting (XSS) is alive and well, and used in attacks to obfuscate malicious links in phishing emails to redirect users to …
Threat actors continue to target job seekers with phony employment offers on job search platforms like Indeed, researchers at Bitdefender warn.
DavidB, the KnowBe4 VP of Asia Pacific and Japan, recently experienced a sophisticated social engineering attack via WhatsApp.
For the fifth year in a row, we've been honored with the TrustRadius Tech Cares Award! This recognition is a testament to our unwavering …
Summer. The season of sun, sand, and romance scams. As the weather heats up, so does the activity of romance scammers, who prey on the …
Researchers at ThreatFabric warn that a phishing campaign is distributing the Chameleon Android malware by impersonating a Customer …
Cyber risks abound, inside and out. Threats to your organization can come in many forms; from a suspicious email with a dodgy attachment to …
Researchers at Menlo Security warn that a phishing campaign is exploiting Google Drawings to evade security filters.
Most people take a lot of measures to secure their online bank accounts, credit card accounts, retirement accounts and other financial …
Excellent reporting by the Wall Street Journal! They wrote about a disturbing trend. "Amid a deluge of election news and memes on TikTok, WSJ …
In a startling revelation at Black Hat 2024, SafeBreach security researcher Alon Leviev demonstrated a critical vulnerability in Windows …
Just when we thought we had something special with our very own North Korean hacker, it turns out this type of fraud has made it to the …
A new phishing campaign is targeting Israeli organizations to deliver the RHADAMANTHYS information-stealing malware, Cyber Security News …
The financial repercussions of the May 2024 ransomware attack on the electronics manufacturing services firm Key Tronic underscores just how …
Your secret weapon to combat cyber threats might be just under your nose! Cybercriminals continue to exploit vulnerabilities while upping …
A report from Darktrace has found that 62% of phishing emails in the first half of 2024 were able to bypass DMARC verification checks in order…
New analysis shows users can be convinced to copy and paste malicious code on behalf of the attacker.
Researchers at Malwarebytes spotted a malvertising campaign that abused Google Ads to target people searching for Google Authenticator.
The Cyber Security Agency of Singapore (CSA) has warned that threat actors are increasingly using AI to enhance phishing and other social …
On August 6th, 2024, we celebrate National Social Engineering Day – a new national day established by KnowBe4 and officially recognized by …
When it comes to creating a strong cybersecurity culture, one of the most powerful tools we have at our disposal is the Phish Alert Button …
The use of the Microsoft brand in phishing attacks demonstrates both its widespread credibility as well as the continued success of attacks …
Analysis of current phishing attacks by security researchers have uncovered an increase in the use of trusted shortlink services.
Included among the U.S. prisoners being sent back to Russia in the swap are two prominent convicted hackers, both of whom were serving lengthy…
Researchers at Barracuda have found that smaller companies tend to receive a higher rate of phishing attacks spread across the organization, …
New analysis of Q2 2024 cyber attacks shows the number of attacks experienced weekly by organizations globally is on the rise.
We are excited to announce that KnowBe4 has been named a leader in the Summer 2024 G2 Grid Report for Security Orchestration, Automation, and …
Researchers at Bitdefender have found that half of all travel-themed spam emails contain scams.
New data shows that cyber attacks have resulted in double the number of data breaches in 2024 than throughout all of 2023.
We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) …
New data on how the threat of AI in cyber crime is being seen as a growing risk provides insight into how organizations are shifting from …
A new cybercriminal group is selling “a sophisticated AI-powered phishing-as-a-service platform” that targets 36 Spanish banks, according to …
In the ever-evolving world of cybercrime, ransomware attacks continue to be a lucrative business for cybercriminals.
Researchers at Palo Alto Networks’s Unit 42 are tracking phishing attacks exploiting interest in generative AI tools. The researchers observed…
The Internet of Things (IoT) has slowly but surely weaved its way into our homes and places of work. From smart homes to industrial control …
Fortinet’s Threat Intelligence Report covering the Paris Olympics provides some very detailed coverage of how threat actors are taking …
Organizations need to be aware of the threat posed by QR code phishing (quishing), according to researchers at Trend Micro.
Organizations are falling victim to ransomware attacks where data is stolen, but the victim isn’t being told about it. I have a theory as to …
In this post, I'll share two fascinating hacking stories I've experienced: one involving a sophisticated scam that targeted a major U.S. …
Wow. Last week's blog post went viral, hitting major media outlets and receiving over 100K hits in just a few days. Most responses, coming …
A new phishing scam is leveraging trusted aspects of ecommerce to make their scams look legitimate.
As expected, threat actors are taking advantage of the global IT outage caused by a faulty CrowdStrike update last Friday, SC Media reports.
Declared “dead” by the U.S. Attorney’s Office in 2023, the Russian cyber crime group Fin7 is impersonating some of the top global brands.
Check out the 26 new pieces of training content added in July, alongside the always fresh content update highlights, events and new features.
Check out the July updates in Compliance Plus so you can stay on top of featured compliance training content.
Frequently Asked Questions About KnowBe4's Fake IT Worker Blog July 23, 2024, I wrote a blog post about how KnowBe4 …
Several threat actors are abusing legitimate cloud services to launch phishing attacks against users in Latin America, according to Google’s …
Protecting your financial information has never been more crucial. With the rise of sophisticated scams, it's becoming increasingly difficult …
According to security researchers at Cisco Talos, emails impersonating legitimate officers at the Cyprus Securities and Exchange Commission …
Incident Report Summary: Insider Threat TLDR: KnowBe4 needed a software engineer for our internal IT AI team. We posted the job, received …
Does the challenge of keeping up with cybersecurity trends sound familiar? You may have been told to update your antivirus software and hope …
Organizations should expect to see phishing attacks exploiting the global IT outage that occurred last Friday, the Business Post reports.
I have been the CEO of an anti-virus software developer. We had a special acronym for catastrophic events like this, a so-called "CEE". As…
New data puts the spotlight on the frequency and impact of modern ransomware attacks, highlighting the overconfidence organizations are …
Phishing is used to completely compromise the victim’s environment after other repeated methods failed.
Our friends at the CyberWire reported: "ZeroFox and Fortinet have both published reports on threats facing the 2024 Olympics in Paris. ZeroFox…
The ransomware attack against UnitedHealth Group’s Change Healthcare platform is expected to cost the company up to $2.45 billion, more than a…
Chile took a major step toward a more resilient cyber landscape for its citizens and the Latin American region on Tuesday, March 26, 2024, …
Despite ransomware getting the lion’s share of the tech pub headlines, business email compromise (BEC) attacks are alive and well… and having …
New data shows that only 3 percent of organizations are solely relying on their current cyber defenses when adding on cyber insurance, …
Phishing remains a top initial access vector for ransomware actors, according to researchers at Cisco Talos. The threat actors often use …
Cybercriminals are maximizing the potential damage to your organization to boost their profits. A staggering 91% of reported ransomware …
Analysis of new ransomware group Volcano Demon provides a detailed look into how and why calling victims ups the chances of ransomware payment.
Researchers at Malwarebytes warn that a malvertising campaign is targeting Mac users with phony Microsoft Teams ads. The ads are meant to …
As cyber threats evolve, the target has become crystal clear: your data. A staggering 90% of ransomware attacks now include a data …
According to the filing, the organization in question failed to devise controls to adequately detect, respond to, and disclose an attack that …
A new report focused on cyber espionage actors targeting government and critical infrastructure sectors highlights the strategic use of …
The US Internal Revenue Service (IRS) has issued an advisory warning of phishing campaigns targeting car dealerships. The IRS says car dealers…
Researchers at Abnormal Security have observed a 360% increase in phishing attacks against state and local government entities over the past …
Ransomware is more prolific and expensive than ever. Depending on the source you read, the average or median ransomware payment was at least …
Researchers at Mandiant (part of Google Cloud) warn that Russian government threat actors continue to target NATO member countries with spear …
Recently I had to prepare for a governance, risk and compliance conference. I promptly realized that although I used to be quite immersed in …
Analysis of the latest phishing-as-a-service (PhaaS) platform ONNX Store highlights just how successful these platforms can be.
Researchers at Check Point observed more than a thousand newly registered malicious or suspicious web domains related to Amazon last month. …
Researchers at ESET warn of phishing attacks that are attempting to hack high-profile YouTube channels in order to spread scams or malware.
I recently read a story about a South Korean telecom company that pushed out malware to over 600,000 of its customers who were using torrents …
In an interview at the Collision technology conference in Toronto, Booking.com’s CISO sounds the alarm on what she calls “supercharged …
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human …
Researchers at Menlo Security discovered three state-sponsored phishing campaigns that have targeted 40,000 important individuals over the …
As social media becomes more intertwined with our daily routines, cybercriminals are using it to trick people with fake job offers. What are …
As popularity grows for these proven methods of weight loss, scammers have taken note and have placed a significant focus on separating …
A new phishing campaign tries to trick email recipients into pasting and executing malicious commands on their system that installs DarkGate …
A few weeks ago I was privileged to visit the 8th grade of a high-school here in Cape Town and talk to the students about cybersecurity, …
What likely started as a quick ransomware “smash and grab” has turned into a headline case resulting in responses from both U.K. and U.S. law …
A hacked customer support portal belonging to router manufacturer Mercku is being used to respond to customer queries with phishing emails, …
Researchers at ESET warn that malvertising campaigns are impersonating AI tools to trick users into installing malware. The Rilide …
In a world where cyber espionage has become as common as a rainy day in London, the recent events surrounding the UK armed forces' payroll …
Check out the June updates in Compliance Plus so you can stay on top of featured compliance training content.
It's a great honor for KnowBe4 to be named the Cyber Security Educator of the Year at the prestigious IT Europa Channel Awards 2024.
Check out the 29 new pieces of training content added in June, alongside the always fresh content update highlights, events and new features.
In a concerning development, TeamViewer, one of the world's leading remote access software providers, has disclosed a cyber attack that …
France’s cybersecurity agency ANSSI has issued an alert outlining a Russian spear phishing campaign targeting French diplomats, the Record …
The US FBI and the Department of Health and Human Services (HHS) have released a joint advisory warning of a social engineering campaign …
Singapore has become the latest target for cybercriminals looking to steal digital identities and exploit them for nefarious purposes.
The BBC recently reported that Booking.com is warning that AI is driving an explosion in travel scams. Up to 900% in their estimation - making…
If you had to choose between regular cybersecurity training and simulated phishing testing, the data shows you should choose simulated …
A crafty group of cybercriminals has been relentlessly pursuing Mexican banks, cryptocurrency platforms and other organizations in an extended…
Over 11 million phishing attacks have been reported to the UK’s Suspicious Email Reporting Service (SERS) over the past year, according to new…
We’re here to help you and your users stay secure from the scourge of ransomware for Ransomware Awareness Month this July with a kit full of …
The current landscape of artificial intelligence (AI) bears a striking resemblance to the early days of the internet. Just as the internet was…
A new report from Barracuda has found that email conversation hijacking attacks have risen by 70% since 2022. Additionally, business email …
My hacker story does not paint me in the best light, and it is not intended to. I am a firm believer in sharing one's mistakes and being open …
In this mad, mad world of breaches, organizations are scrambling to keep their heads above water. It's like trying to navigate a minefield …
Scammers are now impersonating legitimate services like Booking.com and Kayak to target people planning their summer vacations. One out of …
Happy 1st birthday to our KnowBe4 Community! We’re so excited to celebrate our community's first anniversary. It’s been filled with so many …
Mandiant has published a report looking at cyber threats targeting Brazil, finding that more than 85% of government-backed phishing activity …
We live in a world where the term "cybersecurity" tends to make folks either shiver with anxiety or yawn with boredom. The narrative has …
Cybercriminals are broadening their targets to include even local political candidates, as an escalating series of phishing attacks was …
Researchers at Trustwave warn that a phishing campaign is distributing malware via HTML attachments disguised as invoices. Notably, the HTML …
Increasing phishing attacks are a constant threat to organizations, making it crucial for users to report suspicious emails.
Japan has a large number of Forbes Global 2000 corporations--more than the UK, Germany, and France combined. Despite this economic strength, …
A phishing campaign is impersonating recruiting firms to target job seekers with a new strain of malware, according to researchers at Elastic …
Based on news cycles within cybersecurity, it's easy to fall into the trap of thinking that threats only come from certain parts of the world …
A new phishing-as-a-service toolkit that leverages credential interception and anti-detection capabilities has put EU banks at severe risk of …
My hacker story occurred not too long ago at the Hong Kong office of an undisclosed multinational corporation. The hackers pulled off a …
Cybercriminals never sleep, and their aim keeps getting better. According to new research from Abnormal Security, phishing attacks targeting …
Just when you thought the disinformation landscape couldn't get any worse, an alarming new report from Democracy Reporting International …
Job seekers, beware - cybercriminals have a nasty new way to slide their malicious code on corporate networks. Researchers have uncovered a …
A phishing campaign is spreading the DarkGate malware using new techniques to evade security filters, according to researchers at Cisco Talos.
A new phishing campaign is exploiting the eSignature platform Yousign.
Wow. It does not happen often that the godfather of infosec comes out this strong about phishing risks. He co-published new research in the …
Social engineering and phishing are not just IT buzzwords; they are potent threats capable of devastating damage to your organization.
The PhishER Plus platform just got smarter with the addition of the new PhishER Plus Threat Intel feature that integrates web reputation data …
New data highlights just how dangerous Business Email Compromise attacks are.
The Minnesota Judicial Branch has issued an advisory warning that scammers are messaging Minnesotans with phony arrest warrants for missing …
I have created a comprehensive webinar, based on my recent book, “Fighting Phishing: Everything You Can Do to Fight Social Engineering and …
When the news first broke about a potential data breach at Ticketmaster, the details were murky. The Department of Home Affairs confirmed a …
Social engineering scams can come through any communications channel (e.g., email, web, social media, SMS, phone call, etc.). They can even …
Coordinated efforts between law enforcement agencies across nine countries has resulted in a major disruption of a threat group’s malware and …
More than a quarter (26%) of organizations around the world provide no security awareness training for their employees, according to a survey …
The US Federal Trade Commission (FTC) has found that Best Buy, and its tech support subsidiary Geek Squad, were the most commonly impersonated…
As email compromise attacks increase, analysis of tactics provides context on how organizations need to evolve their defenses.
The NIS2 Directive, also known as the Network and Information Security Directive, is a crucial piece of legislation designed to enhance …
The prevalence of cyber crime continues to soar, victimizing individuals in both their work and private lives. Cybercriminals are indiscriminate, …
Researchers at Recorded Future warn that BlueDelta, a threat actor tied to Russia’s GRU, is launching spear phishing attacks against European …
An increasing number of phishing campaigns from several threat groups are being tracked as they leverage legitimate Cloudflare services as …
Check out the May updates in Compliance Plus so you can stay on top of featured compliance training content.
Security awareness training (SAT) and simulated phishing works to significantly reduce cybersecurity risk. We have the data, customer …
New insight into ransomware attacks show that cyber attacks are a top concern for organizations – with many not aware they were a victim until…
Check out the 60 new pieces of training content added in May, alongside the always fresh content update highlights, events and new features.
Criminals are launching a variety of scams targeting Muslims around the world who are planning on making the Hajj pilgrimage to Mecca, …
Threat actors are abusing cloud storage platforms to host phishing sites that can more easily evade detection by security scanners, according …
This Pro-Hamas hacktivist group has updated their payload arsenal to include updated versions of their BiBi Wiper malware, and two new wiper …
We are big fans of the U.S. Cybersecurity Infrastructure Security Agency (CISA), whose informal slogan of “An organization so committed to …
The China-aligned threat actor “Sharp Dragon” is launching spear phishing attacks against government entities in African and Caribbean …
If you want to sell cloud-based software to the U.S. Government, you need to be FedRAMP authorized. This is what they state in their Program …
Working to ensure all communities within the United States are educated and prepared, the Cybersecurity and Infrastructure Security Agency …
Fluctuations in consecutive quarterly reports demonstrates that organizations should be worried that their cyber defenses may not be strong …
Several phishing campaigns are targeting users of the Foxit PDF Reader, according to researchers at Check Point. Foxit is a popular …
As someone who can barely keep up when my 10-year-old shows me around his Minecraft worlds, I was a bit apprehensive about writing a review of…
Companies have needed a website for the last 25 years at least. But where do you host your site? The techies at HostingAdvice decided to …
The UK’s National Cyber Security Centre (NCSC) has issued guidance to help medium-sized organizations defend themselves against business email…
Summer has finally arrived in certain parts of the world, and with it come many exciting events — from the grandeur of the Olympics to the …
Analysis of malicious large language model (LLM) offerings on the dark web uncovers wide variation in service quality, methodology and value –…
I recently heard another heartbreaking story of students who were scammed out of financial aid by a phishing attack. We have also heard …
For better or for worse, we live in a world that is an anarchy of nations. Over the last few decades, warfare has transcended traditional …
Researchers at IBM X-Force are tracking several large phishing campaigns spreading an updated version of the Grandoreiro banking trojan.
New data covering cyber insurance claims through 2023 shows claims have increased while reaffirming what we already know: phishing and social …
Analysis of over 3.5 billion attacks provides insight into where threat actors are placing their efforts and where you should focus your cyber…
Despite growing security investments in prevention, detection and response to threats, users are still making uninformed mistakes and causing …
Regardless of whether your environment is on-premises, in the cloud or hybrid, new data makes it clear that users are the top cybersecurity …
A scam operation called “Estate” has attempted to trick nearly a hundred thousand people into handing over multi-factor authentication codes …
Rapid7 reports an interesting social engineering scheme that easily bypasses content filtering defenses and creatively uses a fake help desk …
New data shows that despite the massive evolution of the cybercrime economy, threat actors are sticking with the basics in social engineering …
The US Federal Bureau of Investigation’s (FBI’s) San Francisco division warns that threat actors are increasingly using AI tools to improve …
Attackers are exploiting Reflected Cross-Site Scripting (XSS) flaws to bypass security filters, according to a new report from Vipre. This …
Trend analysis of ransomware attacks in the first quarter of this year reveals a continual increase in the number of "unknown" initial attack …
The Royal Canadian Mounted Police (RCMP) in Nova Scotia is warning of spear phishing attacks that impersonate company managers. The scammers …
New analysis of Q1’s ransomware attacks uncovers a single group responsible for the majority and discusses what makes them so successful.
"Reality Hijacked" isn't just a title—it's a wake-up call. The advent and acceleration of GenAI is redefining our relationship with 'reality' …
Just when you think bad actors cannot sink any lower, they find a way to. In a recent chilling evolution of ransomware tactics, attackers are …
Like most observers, I celebrated Google’s recent announcement on April 9th about new multi-party approvals for a handful or so of common …
New data shows organizations are improving their ability to detect and respond to ransomware attacks, but is it fast enough to make a …
One of the largest phishing-as-a-service platforms, LabHost, was severely disrupted by law enforcement in 19 countries during a year-long …
The Met Gala, fashion's biggest night, was not just the A-list attendees who stole the spotlight—digital imposters in the form of AI-generated…
In the quest to secure the integrity of elections, Arizona election workers have taken a groundbreaking step by participating in a …
Boeing recently confirmed that in October 2023, it fell victim to an attack by the LockBit ransomware gang, which disrupted some of its parts …
Keeping up to date what is happening is crucial in IT, but the reliability of the news you consume is facing a growing threat.
Switzerland’s National Cyber Security Centre (NCSC) received more than 30,000 reports of cyber incidents in the second half of 2023, more than…
New analysis of cyber attacks shows ransomware attacks are running far more rampant than previously thought, with half of organizations …
KnowBe4 is proud to be recognized by TrustRadius for our Security Awareness Training and PhishER platforms.
Innovative analysis of data breaches shows which attack vectors are being used and how they’re enabled, highlighting the roles phishing and …
A phishing campaign is impersonating fashion retailer Shein in an attempt to steal users’ credentials, according to researchers at Check Point.
New data from Verizon makes it clear that the Education sector is under attack, but also breaks down which threat actions and patterns are …
The North Korean state-sponsored threat actor Kimsuky is launching spear phishing attacks against individuals working at think tanks and …
I'm excited to unveil our newly redesigned website at knowbe4.com! The team has worked hard to create a sleek, modern design with improved …
The long-awaited annual Verizon Data Breach Investigations Report is out, and it’s made very clear that users continue to be a problem in …
For most folks, social media has become integral to their daily lives in today's hyperconnected world. They use platforms like Facebook, …
Newly-released data highlights our worst fears about the prevalence of phishing, and some glimmer of hope that the good guys may be winning …
Is "RogerLovesTaco$24" a strong password? No! Everyone has a ton of passwords. They should be strong and unique for every site and service you…
With all great power, there comes an equal potential for misuse. Among the sophisticated arsenal of threat actors, impersonation attacks have …
A major U.S. healthcare provider significantly reduced their employees' susceptibility to callback phishing attacks after using KnowBe4's …
Suspected North Korean threat actors are attempting to trick software developers into downloading malware during phony job interviews, …
The US Federal Bureau of Investigation (FBI) has issued an advisory warning of a scam campaign targeting users of online dating platforms. The…
For many fresh out of college, the drive to land that first professional role is a top priority. Yet, new graduates can be exposed to …
This blog was co-written by Javvad Malik and Erich Kron. Let’s dive into the cautionary world of phishing simulations gone wrong. You know, …
Cyber activity by the group "The Com," which leverages (SIM) swapping, cryptocurrency theft, swatting, and corporate intrusions, is increasing.
One of the best things you can teach yourself, your family, and your organization is how to recognize the common signs of phishing and how to …
Researchers at Akamai have found that phishing sites impersonating the U.S. Postal Service get as much traffic as the real USPS website.
Check out the April updates in Compliance Plus so you can stay on top of featured compliance training content.
In an unsettling turn of events, a high school athletic director in Maryland is accused of using artificial intelligence (AI) in a morally …
The US Department of Justice has indicted four Iranian nationals for allegedly launching spear phishing attacks against the US government and …
May 2nd is World Password Day. Despite the computer industry telling us for decades that our passwords will soon be gone, we now have more …
Check out the 33 new pieces of training content added in April, alongside the always fresh content update highlights, events and new features.
Threat actors are increasingly using generative AI tools to improve their phishing campaigns, according to a new report from Zscaler.
According to the U.S. Chamber of Commerce, the pressure is mounting on small and medium businesses (SMBs), as they must get their cyber …
Attackers are launching phishing campaigns using an open-redirect vulnerability affecting a website belonging to coffee machine company …
Global optics manufacturer Hoya had business operations at its headquarters and several business divisions impacted and is now facing a “No …
We’re thrilled to announce our newest addition to our ModStore’s already brimming collection of games with a new offering based on our …
KnowBe4 is committed to sustainability and helping protect the environment, as evidenced by our initiatives such as our public commitment to …
New data shows phishing attacks are deviating from the traditional focus on technology and retail sectors and are opting for alternate brands …
We released a new game, now available on the KnowBe4 Modstore. I played it myself and this is recommended for all Inside Man fans! "Mark …
A new survey of physicians details the devastating impact of the Change Healthcare cyber attack on the healthcare sector.
The other day I was participating in a company’s employee meeting when the CEO revealed he had been “caught” that morning by a real phishing …
Analysis of cyber attacks targeting U.K. organizations highlights the effectiveness of social engineering attacks and the fact that businesses…
The cybercriminal threat actor FIN7 is launching spear phishing attacks against the automotive industry in the United States, according to …
LastPass has warned that one of its employees was targeted by a social engineering attack that used an audio deepfake that impersonated the …
New advancements in generative AI voice cloning come at a time when banks are looking for additional ways to authenticate their customers – …
We are excited to announce that KnowBe4 has been named a leader in the Spring 2024 G2 Grid Report for Security Orchestration, Automation, and …
Microsoft and Google were the most frequently impersonated brands in phishing attacks during the first quarter of 2024, according to a report …
In a new report, Cisco says the cyber readiness of organizations is lacking despite having experienced multiple cyber attacks within the last …
We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) …
The FBI has issued an alert warning of a widespread SMS phishing (smishing) campaign targeting people in several US states with phony notices …
“If the product is free, you are the product!” No truer words have ever been spoken. But in today’s internet-connected, ad-everywhere world, …
So today, news broke that Iran has sent dozens, if not more than 100 drones to Israel in a direct attack. Discussion on Twitter also claim …
In a groundbreaking study that spanned three years, an international research team, including experts from the University of Oxford and UNSW …
A shocking report shows how email-based disinformation campaigns can have material real-world impacts to the citizens in the targeted …
A new sector alert published by the U.S. Department of Health and Human Services outlines new attacks in which social engineering is used to …
The International Monetary Fund (IMF) has warned that severe cyber attacks against financial institutions could lead to major bank runs and …
The very fabric that stitches our society together — our councils and local governing bodies — is under a silent siege from cyber attacks. The…
The Holland on the Hill Freddy Heineken Award honors an entrepreneur who has made a substantial and positive contribution to the US-Dutch …
In December 2023, a joint alert was issued by the FBI, CISA, NSA, EPA, and INCD regarding Iranian cyber actors known as "CyberAv3ngers" linked…
As the April 15, 2024 filing deadline approaches, tax scammers are working overtime to take advantage of rushed or stressed taxpayers.
Researchers at BlueVoyant observed a 50% increase in large-scale malvertising campaigns in 2023 compared to 2022.
I have been in the cybersecurity industry for over 35 years and I am the author of 14 books and over 1,400 articles on cybersecurity.
A new PhaaS service brings the power of bypassing multi-factor authentication (MFA) to the world’s most-used email platforms.
Your personal information is continuously harvested and analyzed by countless data brokers eager to sell to the highest bidder. From your name…
The Australian Government has leveraged insight from cybersecurity experts to create a new six-part plan to combat cybersecurity over the …
The Tokyo Metropolitan Police Department has warned of a phishing scam that’s attempting to trick individuals with phony arrest warrants, the …
A new campaign of StrelaStealer attacks identified by security analysts at Unit42 has been spotted targeting E.U. and U.S. organizations. This…
Social media has become an indispensable tool for communication, outreach, and engagement. From world leaders to high-profile individuals, …
At least twelve men working in the UK parliament have recently been targeted by WhatsApp spear phishing messages, POLITICO reports. The …
A new string of multi-factor authentication (MFA) attacks targeting the reset of Apple IDs seem to be popping up in a likely attempt to steal …
New data shows that the attacks IT feels most inadequate to stop are the ones they’re experiencing the most.
A trojanized version of the McAfee Security app is installing the Android banking Trojan “Vultur,” according to researchers at Fox-IT. The …
New TTP attack data covering 2023 sheds much needed light on the threat actor and user actions that are putting organizations at the most risk.
The UK government's third phase of research shows how well UK organizations have been improving their cybersecurity efforts but …
A journalist in Pennsylvania was targeted by phishing attacks that involved thread hijacking, according to Brian Krebs at KrebsOnSecurity.
The Kyiv Post just published: "A knockout study by the Institute for the Study of War (“ISW”), just out March 27, is a must read for all the …
Check out the March updates in Compliance Plus so you can stay on top of featured compliance training content.
New analysis of APT29’s (aka Cozy Bear) activities and their association with Russia’s Foreign Intelligence Service (SVR) has revealed …
Using little more than a well-known business name and a invoice-related PDF, the “NaurLegal” phishing campaign aims at installing malware …
New data shows organizations are well aware that their users are one of their greatest cybersecurity risks today, and yet aren’t taking the …
A new malware loader is delivering the Agent Tesla remote access Trojan (RAT), according to researchers at Trustwave SpiderLabs. The malware …
Check out the 35 new pieces of training content added in March, alongside the always fresh content update highlights, events and new features.
Attention Google Workspace users! You’ve asked, and we’ve delivered, integrating KnowBe4's SecurityCoach with Google Chat.
The threat of novel malware is growing exponentially, making it more difficult for security solutions to identify attachments and links to …
Analysis of a new initial access malware attack shows how simple these attacks can be while also proving that malware can reside on legitimate…
Israeli researchers came out with a hell of a hing just now. Here is a bit of the abstract and a video. YIKES.
A new report on the state of email security sheds some light on how organizations are viewing and approaching cyber insurance as they shift …
A Phishing-as-a-Service (PhaaS) platform called “Tycoon 2FA” has surged in popularity over the past several months, according to researchers …
We’re thrilled to announce the release of the 2024 Security Culture Report, which dives deep into how security measures affect organizations …
A new Chrome update brings to light Google findings about malicious websites that have serious implications on detecting malicious links, …
The one thing I love about our annual conference in Orlando, KB4-CON, is its thought-provoking nature. Year after year, the events team …
The FBI’s Internet Crime Complaint Center (IC3) newly-released Internet Crimes Report provides an unbiased big picture of the cyber crimes …
New data shows increased expertise in leveraging and exploiting cloud environments.
The following paragraphs were cited directly from my recent article highlighting social engineering. "Social engineering and phishing are …
The threat group "RA World" (formerly RA Group) has shifted from country-specific ransomware attacks to include specific industries via a new …
Researchers at Fortinet are tracking a phishing campaign that’s distributing a new version of the VCURMS remote access Trojan (RAT).
In an age when 70% - 90% of successful data breaches involve social engineering (which gets past all other defenses), sufficient training is …
James Rundle at The Wall Street Journal today reported that in response to escalating supply-chain cyberattacks, companies are intensifying …
Today, artificial intelligence (AI) is no longer a futuristic concept but a tool that is driving operational efficiency, customer experience, …
New analysis shows that the combination of phishing, email, remote access, and compromised accounts are the focus for most threat actors.
Researchers at IBM X-Force are monitoring several ongoing phishing campaigns by the Russian state-sponsored threat actor ITG05 (also known as …
Analysis of attacks on banking institutions in Canada can be almost perfectly tied to the use and availability of phishing-as-a-service …
A joint cybersecurity advisory published last week discusses ransomware attack impacts on healthcare, along with ALPHV’s attack techniques, …
A majority of organizations have a false sense of security regarding their resistance to phishing attacks, according to a new report from …
Social engineering and phishing are involved in 70% to 90% of all successful cybersecurity attacks. No other initial root hacking cause comes …
New analysis of incident data shows threat actors are evolving their attack techniques to take advantage of budget and resource-strapped small…
With QR-code phishing attacks on the rise, new data sheds light on just how unprepared organizations actually are in stopping and detecting …
Business email compromise (BEC) attacks surged by 246% last year, according to researchers at ReliaQuest.The researchers believe the increase …
Data trends show a clear upward momentum of posts from initial access brokers on the dark web, putting the spotlight on what may become …
Scammers are using AI technology to assist in voice phishing (vishing) campaigns, the Better Business Bureau (BBB) warns. Generative AI tools …
Social engineering attacks can seem unpredictable and challenging to defend against. However, with the right approach, organizations can …
AI is evolving a breakneck speed. Elon Musk recently said: "I've never seen any technology advance faster than AI compute. We are on the edge…
Scammers are impersonating job-seeking platform Dice with phony employment opportunities designed to steal victims’ information.
Do not forget, AI-enabled technologies, like KnowBe4’s Artificial Intelligence Defense Agents (AIDA), will make defenses increasingly better.
As cybercriminals leverage tools like generative AI, making attacks easier to execute and with a higher degree of success, phishing attacks …
The construction of a more cyber resilient European Union (EU) took a remarkable step forward this past week as negotiators from the European …
The specter of cybercrime continues to grow, with losses soaring to $12.5 billion in 2023, according to the recently released Internet Crime …
According to my research, it became clear that if CISO's focused on these three items, it would take care of 99% of the vulnerabilities.
A recent report reveals a significant discrepancy in the priorities of mid-market IT departments when it comes to addressing cyber threats. …
Researchers at Zscaler observed a cyberespionage campaign that targeted European diplomats with malicious PDFs disguised as invitations to a …
In a world where digital threats grow more sophisticated by the day, gaining firsthand knowledge from those who have successfully bolstered …
New analysis of DNS queries shows material growth in phishing, malware and botnets and offers insight into how many threats the average person…
A 30-year-old man from Chicago, Joseph Alexander Valdez, has been sentenced to eight years in prison for conducting a Snapchat phishing scheme…
Analysis of emerging threats in the age of AI provides insight into exactly how cybercriminals are leveraging AI to advance their efforts.
A recent great article by BleepingComputer about domain hijacking and DMARC abuse reminded me that many companies and people do not understand…
Researchers at Lookout have discovered a sophisticated phishing kit that’s targeting employees at the US Federal Communications Commission …
Our team at KnowBe4 recently got together to talk about planning for annual security and compliance training.
As social media phishing reaches new heights, new data reviewing 2023 shows a massive effort by cybercriminals to leverage impersonation of …
Analysis of the second half of 2023 shows attackers are getting more aggressive with email-based phishing attacks in both frequency and …
Newly-released data covering cyberthreats experienced in 2023 sheds some light on how very different last year was and paints a picture of …
A phishing campaign is targeting users in Mexico with tax-themed lures, according to researchers at Cisco Talos. The phishing emails direct …
I have been working in cybersecurity for a long time, since 1987, over 35 years. And, surprisingly to many readers/observers, I often say I …
New analysis of a phishing campaign shows how cybercriminals use brand impersonation of the platforms they need to compromise accounts and …
According to IBM X-Force’s latest Threat Intelligence Index, 30% of all cyber incidents in 2023 involved abuse of valid credentials. X-Force’s…
Emails are still the most common delivery method for malicious files, according to Check Point’s Cyber Security Report for 2024.
For the first time, analysis of ransomware payments made in a single year tops $1,000,000,000. This signals a massive return to more frequent,…
WIRED just published a scary (long) article. I am summarizing it here and highly recommend you read the whole thing.
Attacks targeting Swiss residents increased 10% last year, according to newly-released data that shows a growth in not just phishing attacks, …
Check out the February updates in Compliance Plus so you can stay on top of featured compliance training content.
Venturebeat had the scoop on a fresh Group-IB report. They discovered the first banking trojan that steals people’s faces. Unsuspecting users …
Thirty percent of all cyber incidents in 2023 involved abuse of valid credentials, according to IBM X-Force’s latest Threat Intelligence …
A single account being phished caused millions of French healthcare policyholder records to be breached.
Check out the 29 new pieces of training content added in February, alongside the always fresh content update highlights, events and new …
I get my news from a very wide variety of sources. One is the venerable SpyTalk news that lives in Substack. They just reported something …
QR-code attacks leveraging QR-codes are kicking into high gear and becoming a common method used in phishing attacks, according to new data …
I recently read an article about a bright, sophisticated woman who fell victim to an unbelievable scam. By unbelievable, I mean most people …
Researchers at VIPRE Security observed a 276% increase in malware delivered by phishing between Q1 and Q4 of 2023.
The KnowBe4 Learner App enables your users to complete their security awareness and compliance training conveniently from their smartphones …
A widespread malvertising campaign is attempting to trick users into paying phony utility bills, according to researchers at Malwarebytes.
In the rapidly evolving landscape of artificial intelligence (AI), the launch of Sora by OpenAI marks an unnerving milestone in video synthesis.
With the idea in mind to “audio-jack” a live call-based banking transaction, security researchers were successful in inserting …
As an InfoSec professional, one of your many important responsibilities is to minimize expensive downtime and prevent data breaches.
Numerous state-sponsored threat actors frequently launched spear phishing attacks against European Union entities last year, according to a …
New data on how organizations are able to respond to ransomware attacks also shows that paying a ransom is highly likely, despite having a …
The thought of building and improving your organization’s security culture can seem like a daunting task. How can you influence an entire …
Cybercriminals are taking advantage of the messaging platform Telegram by creating channels and groups where learning and commerce all can …
Recently, Apple launched its Apple Vision Pro to much fanfare and has pushed the discussion of Augmented Reality (AR) beyond the realms of …
Researchers at Volexity warn that the suspected Iranian threat actor CharmingCypress (also known as “Charming Kitten” or “APT42”) has been …
As the popularity of SaaS apps continues to grow, security analysts expect the misuse of such apps as the host for malware downloads to …
A phishing campaign is attempting to trick users into downloading remote monitoring and management (RMM) software like AnyDesk, Atera, and …
New data summarizing the compromises of data in 2023 provides key details on who’s being targeted, what types of data is being compromised, …
Valentine's Day. A time where love is in the air, florists work overtime, and restaurant tables are as scarce as a truthful politician. But as…
Analysis of this newly-spotted service makes it clear that the newest entrant into the Ransomware-as-a-Service (RaaS) space has taken note of …
The UK's National Cyber Security Centre (NCSC), recently shared its findings on how AI might reshape the cyber landscape. In two separate …
Seeing as this week is Valentine’s Day, I should have written something about rom coms, true love, and trusting your heart more. But this is …
New data sheds light on what kinds of cyber attacks are targeting your cybersecurity team, what it’s costing them, why it’s taking so much …
The US Federal Trade Commission (FTC) has disclosed that people in the United States lost a record $10 billion to fraud in 2023, a 14% …
The U.S. Securities and Exchange Commission (SEC), through a new requirement of Item 1.05 of the 8-K, requires that all regulated companies …
A new report shows massive increases in browser attacks in the second half of 2023, with over 31,000 threats specifically designed to bypass …
Users should be wary of online romance scams ahead of Valentine’s Day, according to Imogen Byers at ESET. While in the past these scams could …
Growing cybersecurity threats, especially ransomware attacks, and the Securities and Exchange Commission’s (SEC) recent rules have made having…
Organizations are finally dialing in on where they need to focus their cybersecurity strategies, starting with phishing. But the top four …
Cybercriminals increasingly used malvertising to gain initial access to victims’ networks in 2023, according to Malwarebytes’s latest State of…
In a revelation that adds yet another chapter to the ongoing saga of international cybersecurity threats, the Dutch Ministry of Defense …
Sophisticated cybercriminals are playing the long game. Unlike the typical hit-and-run cyber attacks, they build trust before laying their …
Organizations are increasingly facing cyber attacks resulting in data breaches, and part of their post-incident responsibilities includes …
Criminal threat actors are increasingly utilizing generative AI tools like ChatGPT to launch social engineering attacks, according to …
A phishing-as-a-service platform called “Greatness” is facilitating phishing attacks against Microsoft 365 accounts, according to researchers …
A new scam relies on a victim's sense of curiosity, brand impersonation, and the hopes of a new login to compromise Facebook credentials.
Check out this one line for a moment...“duped into attending a video call with what he thought were several other members of staff, but all of…
Analysis of 2023 attacks shows how the financial services industry had a very bad year, with increases in both vendor email compromise (VEC) …
New data from cyber insurance underwriters shows what they think the biggest threats will be in 2024 and what organizations should do about …
Attackers are abusing Microsoft Teams to send phishing messages, according to researchers at AT&T Cybersecurity.
The AP published a great article. This is your executive summary: Conspiracy theories have always been part of American culture, but advanced …
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human …
The US Federal Bureau of Investigation (FBI) has issued an alert warning that scammers are tricking victims into converting their savings into…
New data for Q4 of 2023 reveals a sizable shift in the cyber threat landscape, with serious implications regarding ransomware and social …
Linking compliance training to specific outcomes is hard. Compliance training has a reputation for being challenging for organizations to …
Check Point’s review of ransomware shows that the percent of organizations worldwide hit by this greatest of cyberthreats rose by a whopping …
Phishing attacks are increasingly using open redirects to evade detection by security filters, according to researchers at Trustwave.
Researchers have developed AI technology that can mimic someone’s handwriting with only a few paragraphs of written content. Experts worry …
Researchers at Malwarebytes warn that a malvertising campaign is targeting Chinese-speaking users with phony ads for encrypted messaging apps.…
Passwords are part of every organization’s security risk profile. Just one weak password with access to an organization’s critical systems can…
Researchers at Check Point warn that scammers are using airdrops to distribute phony non-fungible tokens (NFTs) that direct users to malicious…
Bravo host Andy Cohen tells how he became the victim of an impersonation scam that gave scammers access to control his bank account.
Check out the January updates in Compliance Plus so you can stay on top of featured compliance training content.
Check out the 37 new pieces of training content added in January, alongside the always fresh content update highlights, events and new features.
Russia is not the only global problem that democracy has to deal with. The Chinese regime ran large influence campaigns, attempting mass …
The surge in Ransomware-as-a-Service affiliates is likely the reason behind the dramatic increase in the number of victimized organizations, …
In a new SEC disclosure, Hewlett Packard Enterprise (HPE) announced on Wednesday that it fell prey to the same Russian intelligence group, …
Researchers at Menlo Security observed a 198% increase in browser-based phishing attacks over the past six months.
Spear phishing and voice phishing (vishing) are on the rise in the trucking industry, according to a new report from the National Motor …
A new wave of ads utilizing video of well-known celebrities seemingly promoting video games, fake giveaways, and more are starting to popup, …
If you haven’t heard of Roblox, you probably don’t have kids like me. Roblox is an online virtual world/metaverse that has been around since …
As the use of Cloud SaaS platforms of generative AI solutions increases, the likelihood of more “GPT” attacks used to gather credentials, …
A suspected North Korean state-sponsored threat actor called “ScarCruft” is launching spear phishing attacks against cybersecurity …
Cybernews just reported: In what appears to be a digital tsunami, a colossal data breach has surfaced, unveiling a staggering 26 billion …
BleepingComputer describes a phishing scam that’s been running rampant on Facebook for the past several months, in which threat actors use …
I am not scared of AI. What I mean is that I do not think AI is going to kill humanity Terminator-style. I think AI is going to be responsible…
The Russian state-sponsored threat actor “COLDRIVER” is launching phishing campaigns against “high profile individuals in NGOs, former …
In a Friday regulatory filing, Microsoft has reported that its corporate email accounts were compromised by a Russian state-sponsored hacking …
A new job posting scam found by IT security company Qualysys is focused on capturing victim’s identity details, accessing victim’s Facebook …
Some particularly cold-hearted scammers are targeting users of lost pet forums with phony ransom demands, the BBC reports.
A new analysis of data breaches in the United Kingdom's legal sector shows that organizations need to be looking inward more and look for ways…
Rather than stick to traditional ransomware extortion methods that revolve around the attack itself, a new form of extortion known as Swatting…
A survey by Egress has found that 94% of organizations were hit by phishing attacks in 2023, Infosecurity Magazine reports. Additionally, 91% …
A phishing campaign is targeting Chinese users in an attempt to distribute malicious apps, according to researchers at Palo Alto Networks’s …
Mandiant has published a report on “CLINKSINK,” a cryptocurrency Drainer-as-a-Service (DaaS) that’s targeting users of the Solana currency.
A new article explains how business professionals are beginning to be not-so-professional and seeking to make personal connections. It’s only …
It’s no longer theoretical; phishing attacks and email scams are leveraging AI-generated content based on testing with anti-AI content …
The Canada-based Women CyberSecurity Society (WCS2) has warned that its leadership, members, and volunteers are being targeted by an SMS …
Regardless of whether your environment remains on-premise, resides in the cloud, or is a hybrid configuration, new data makes it clear that …
In a surprising turn of events for Formula 1 enthusiasts, the Haas F1 Team is grappling with the departure of its widely-respected Team …
Trained security awareness professionals are aware that whatever someone says about themselves and personal experiences can be used against …
Microsoft was the most impersonated brand last quarter, accounting for a third (33%) of all brand phishing attempts in October, November, and …
The latest consumer alert posted by the federal trade commission (FTC) signals that the upticks in QR code-based scams are being seen by …
We are excited to announce that KnowBe4 has been named a leader in the Winter 2024 G2 Grid Report for Security Orchestration, Automation, and …
Artificial intelligence (AI) in the cybersecurity realm is a nuanced topic. On the one hand, it has the potential to enhance our abilities to …
The world can be a scary and dangerous place. Its unethical scammers have no problem doing almost anything to make a buck, but sometimes, …
Researchers at Trend Micro warn that a threat actor known as “Water Curupira” is distributing the Pikabot malware loader via widespread …
We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) …
Millions of data records and GBs of data from organizations around the globe were made freely available to cybercriminals to coincide with …
Verizon has published an article outlining various forms of social engineering attacks, including SMS/text messaging phishing (smishing), …
Navigating the cloud security landscape is no walk in the park. It requires IT professionals like you to not only tackle traditional security …
For the first time ever, the U.S. Justice Department announced the existence of an FBI-developed decryption tool that has been used to save …
I need your help, I'm super interested to know what your current preferences are related to licensing and pricing models for security …
A flaw found by security researchers in the encryption software allows victim organizations to use “Black Basta Buster” to recover some of …
Be careful of emails, SMS messages, or calls claiming to be from your bank about your card being used fraudulently. If this ever happens, call…
Resecurity is tracking a cybercriminal gang called “GXC Team” that develops and sells tools to facilitate online banking theft and social …
With over half of organizations being the victim of password-based attacks in the last year, new data sheds light on the risk of phishing …
Do you need an easy, automated way to provide real-time feedback the moment your users make risky mistakes to help reinforce the training …
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human …
Hitting three hospitals within a Germany-based hospital network, the extent of the damage in this confirmed ransomware attack remains …
Researchers at Scam Sniffers have found that phishing attacks stole nearly $295 million worth of cryptocurrency from 324,000 victims in 2023, …
Every person and organization is different and requires slightly different methods and ways of learning. But every person and organization can…
Cybersecurity exists to protect people and their information. In our recent discussion on Security Masterminds, Julie provided unique insights…
Fascinating article at TechXplore, December 28, 2023. Computer scientists from Nanyang Technological University, Singapore (NTU Singapore) …
The year 2024 is shaping up to be a pivotal moment in the evolution of artificial intelligence (AI), particularly in the realm of …
Check out the 36 new pieces of training content added in December, alongside the always fresh content update highlights, events and new …
With so much of an attack riding on a cybercriminals ability to gain access to systems, applications and data, experts predict the trend of …
A new report from the U.K. government’s Joint Committee on the National Security Strategy (JCNSS) outlines both just how likely an attack on …
A newly-discovered technique misusing SMTP commands allows cybercriminals to pass SPF, DKIM and DMARC checks, empowering impersonated emails …
When I was young, I was an oceanfront lifeguard, firefighter and EMT paramedic. All disciplines involved frequent education and training.
With November demonstrating multiple increases when compared to various previous time periods, new data signals that we may be in for a bumpy …
Cybersecurity researchers at Group-IB have identified a single scam campaign leveraging over 1500 websites impersonating postal carriers and …
I found an interesting article at THEHILL that started with "Fears grow over AI’s impact on the 2024 election" and discusses the rising …
The CyberExpress is a VC-backed cyber security news mag that provides the latest news and analysis about the information security industry. …
I just found a great post by Morgan Wright, chief security advisor of SentinelOne. Here is a quick summary and a link to the full article is …
In response to what Google calls “over trust” in the web address lock icon to indicate that a site is authentic and its’ communications are …
Marketplaces such as OLVX are shifting from the dark web to the open web to take advantage of traditional web services to assist in marketing …
The advent of non-consensual intimate imagery (NCII) as a monetized business on the Internet has shifted pornography into the realm of …
Cybercriminals of the lowest kind breached as many as 800,000 patients and then sent emails threatening to sell their data if they didn’t pay …
This new attack is pretty simple to spot on the front, but should it be successful in launching its’ malicious code, it’s going to take its’ …
Researchers at Bitdefender warn that scammers are tricking victims with fake remote job opportunities. In this case, the scammers tell victims…
Midstride in this year’s holiday shopping, it’s important to realize just how many websites exist that impersonate legitimate online …
As more cybercriminal gangs continue to enter the game, the massive increase in unique types of malware means it will become increasingly …
Urging taxpayers and tax professionals to be vigilant, the Internal Revenue Service (IRS) provides some simple guidance on how to spot new …
Security awareness training (SAT) works! A well-designed security awareness training campaign will significantly reduce cybersecurity risk.
A new BazarCall phishing campaign is using Google Forms to send phony invoices, according to researchers at Abnormal Security.
Taking traditional “delayed package” scams up a notch, new phishing and smishing attack campaigns are leveraging freemium DNS services to …
Analysis of nearly a year’s worth of emails brings insight into exactly what kinds of malicious content are being used, who’s being …
Researchers at Nisos warn that North Korean threat actors are impersonating skilled job seekers in order to obtain remote employment at US …
CISA sent out a warning about a Russian advanced persistent threat (APT) called Star Blizzard warning about their long-game social engineering…
First ever insight into those annoying spam calls provides enlightening detail into how many calls are there, where are they coming from, and …
As the holiday season approaches, so does the annual surge in online shopping and holiday package tracking. Unfortunately, this joyous time …
Researchers at IBM X-Force are tracking a phishing campaign that’s using themes related to the Israel-Hamas war to deliver Headlace, a …
The US Justice Department has indicted two individuals for launching spear phishing attacks against the US, the UK, Ukraine and various NATO …
Security analysts at identity vendor Sumsub are seeing a massive rise in the use of deepfake fraud in their Identity Fraud Report 2023. And …
December 7, 2023 - The Wall Street Journal has an interesting perspective on K-12 Public schools suffering ransomware attacks. The number …
Industry analysts Piper Sandler do a yearly 'Industry Note' where they survey CIOs about their next year budget expectations. For 2024 there …
One of the key strategies to maximize your purchasing power is to research products and compare total cost of ownership. Take the time to do …
Surveys, unfortunately, show that the vast majority of organizations do little to no security awareness training. The average organization, if…
When 97% of CIOs all see things the same way, it’s probably a sign to take the risk of cyber threats seriously – a problem new data shows is …
Even when looking at the various kinds of risks to business, cyber attacks still remain the biggest problem. But new data shows there may be a…
You would be hard-pressed to find an author and organization (KnowBe4) that has pushed the use of phishing-resistant multi-factor …
A phishing campaign is impersonating Disney+ with phony invoices, according to researchers at Abnormal Security. The phishing emails targeted …
The ransomware attack on ICBC Financial Services caused disruption of trading of U.S. Treasuries and marked a new level of breach that could …
In the ever-evolving landscape of cybersecurity, the battle against ransomware has taken a concerning turn. According to the latest findings …
On July 26, the U.S. Security & Exchange Commission (SEC) announced several new cybersecurity rules, taking affect mid-December 2023, that…
New data shows how the overwhelming majority of phishing attacks on financial institutions dwarf every other industry sector by as much as a …
Researchers at McAfee warn that attackers are increasingly utilizing PDF attachments in email phishing campaigns.
Specifically when wars break out, disinformation kicks into high gear. In the wake of the October 7 Hamas attack, the internet has been …
Now being commonly referred to as “Scama” – short for Scamming Method – these kits are being sold promoting highly advanced feature sets, …
In the ever-evolving landscape of cyber threats, scammers and hackers are relentless in exploiting every avenue of communication. From emails …
When you think of KnowBe4, you probably think of phishing training, good password hygiene modules, security awareness, or maybe even data …
Everyone knows you shouldn’t click phishy links. But are your end users prepared to quickly identify the trickiest tactics bad actors use …
Using something as simple as an attachment with an Israel/Hamas-related filename seems to be all it takes for new social engineering attacks …
There is no doubt that more pervasive deepfake and AI technologies will make for more realistic, sophisticated, phishing attacks, and add to …
Czech and Ukrainian police have arrested six individuals responsible for a call center-based vishing scam designed to trick victims into …
Using something as simple as an attachment with an Israel/Palestine-related filename seems to be all it takes for new social engineering …
Researchers at Sophos have found that the criminal market for malicious generative AI tools is still disorganized and contentious.
To celebrate National Computer Security Day, which is recognized on November 30 every year, KnowBe4 encourages all IT and security …
Check out the 49 new pieces of training content added in November, alongside the always fresh content update highlights, events and new …
This is a cautionary tale of both how your data can legally end up in the hands of an organization you never intended and how victims can be …
There’s been a “precipitous rise” in QR code phishing campaigns in 2023, according to Matthew Tyson at CSO.
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human …
With organizations heavily focusing on protecting the corporate endpoint, cybercriminals are switching focus onto mobile devices where users …
Researchers at ESET describe various types of scams launched by users of Telekopye, a telegram bot that assists in crafting social engineering…
The digital landscape is evolving at an exponential rate, and with it, the cybersecurity challenges we face.
New data sheds light on just how active the Initial Access Broker (IAB) business is, and the growth uncovered doesn’t bode well for potential …
Huntress has released a report finding that business email compromise (BEC) attacks have risen in the third quarter of 2023.
A new analysis of the retail market’s threat landscape discusses the challenges faced by this industry and what threat tactics are being used …
Security researchers identify growth in the use of an ongoing cyberskimming campaign that involves compromising legitimate website checkout …
Another day, another warning about holiday scams! Lookout Inc., a data-centric cloud security company, is warning employees and businesses …
Visa Payment Fraud Disruption (PFD) expects phishing attacks to increase between November 2023 and January 2024. Findings in its Holiday …
Scammers are using a compromised X (formerly Twitter) account belonging to Bloomberg Crypto to send users to a phishing site designed to steal…
I recently wrote about how 1 in 34 organizations globally has experienced an attempted ransomware attack. But that statistic doesn’t provide …
If increases in cyberattacks this year are any indication of what to expect in the next six weeks of holiday shopping, we should expect a …
The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have released a joint Cybersecurity Advisory describing the …
Social engineering remains one of the top attack vectors that cybercriminals use to execute malicious acts. KnowBe4’s security awareness …
Travel influencer Johnny Jet has disclosed that he fell victim to a scam that caused him to lose access to his Facebook account, which has …
The massive uptick in QR Code phishing is an indicator that scammers are seeing success in taking victims from the initial attack medium to …
We can’t keep this a secret any longer! Rachel Tobac will be joining us live at KB4-CON 2024, happening in Orlando, Florida March 4-6. She’s …
Man Bites Dog: In an unusual twist in cybercrime, the ransomware group BlackCat/ALPHV is manipulating the SEC's new 4-day rule on cyber …
Within our organizations, there are those employees who consistently exhibit mindfulness, avoiding every phishing attempt. Yet, there are also…
The annual Cyber Threat Report by the Australian Signals Directorate (ASD) was released this week, containing insights that every Australian …
Researchers at Pindrop have published a report looking at consumer interactions with AI-generated deepfakes and voice clones.
New findings show that the overwhelming majority of people have to sort through scam messages and texts.
Researchers at SlowMist describe a phishing campaign that’s distributing a phony version of Skype in order to steal cryptocurrency, …
With organizations globally experiencing an increase in attempted ransomware attacks year over year, new data shows how the global average …
It's the busiest time of year for everyone, especially cybercriminals. They know surges in online shopping, holiday travel and time …
Using a page straight out of the KGB playbook, a new AI-driven disinformation attack has been unleashed. The latest victim of this disturbing …
In a recent official advisory, the FBI warned about the threat of callback phishing (among other threats). Below is the relevant excerpt.
In this blog, we'll take a look at the well-known Sunburst attack of 2018 and how the specific charges stemming from this attack will impact …
Cybersecurity threats continue to put European organisations of all sizes at risk. Infosec leaders face multi-pronged challenges, from …
As ransom payments reach an all-time high, it’s time to look at attacks from a data perspective and find the greatest opportunities to stop …
KnowBe4 is proud to be recognized by TrustRadius for our Security Awareness Training and PhishER platforms in three categories for Best Value …
A phishing campaign is exploiting a large number of .top domains, according to researchers from WhoisXML API. In an article for CircleID, the …
The NYDFS’ 23 NYCRR Part 500 has been updated to reflect the current preventative and responsive measures necessary for Financial Services org…
The fight against cyber threats remains a top priority for all organizations, including phishing attacks. SlashNext just released its …
Targeted individuals were the most common victims of social engineering attacks in the second half of 2022 and the first half of 2023, …
November 12-18, 2024 is International Fraud Awareness Week and I know what you are thinking: “Didn’t we just have an entire month dedicated to…
In an analysis of web pages identified as admin portals, some incredibly weak passwords were identified – and some of them are going to really…
Spear phishing was the most common attack technique in the third quarter of 2023, according to researchers at ReliaQuest.
An analysis of ransomware attacks on healthcare organizations from 2016 through October of 2023 shows the healthcare sector is likely to …
As large organizations realize the likelihood of cyber attacks and improve their cyber readiness, small businesses are seeing increases not …
The never-ending deluge of phishing emails, malware and ransomware threats can leave incident response and security operation teams (SOC) …
Cybersecurity experts expect to see threat actors increasingly make use of AI tools to craft convincing social engineering attacks, according …
October 30, 2023 the Wall street Journal broke news that the United States Security and Exchange Commission sued Solarwinds. Here are the …
Continued analysis of ransomware attacks shows an upward trend in the number of attacks, with September resulting in the highest number of …
Microsoft is tracking a cybercriminal group called “Octo Tempest” that uses threats of violence as part of its social engineering and data …
Researchers at INKY warn that a phishing campaign is attempting to distribute malware by impersonating PepsiCo.
Let me give you a quick introduction. My name is Stu Sjouwerman (pronounced shower-man). I’m the Founder and CEO of KnowBe4, my 5th startup. I…
Let me give you a quick introduction. My name is Stu Sjouwerman (pronounced shower-man). I’m the Founder and CEO of KnowBe4, my 5th startup. I…
Several months ago, Netskope Threat Labs uncovered a surge in PDF phishing attachments infiltrating Microsoft Live Outlook. These attacks were…
Linking compliance training to specific outcomes is hard. Compliance training has a reputation for being challenging for organizations to …
Check out the 27 new pieces of training content added in October, alongside the always fresh content update highlights, events and new features.
To celebrate Cybersecurity Awareness Month this year, KnowBe4 customers from various industries and backgrounds are sharing their innovative …
Red teamers at IBM X-Force warn that AI-generated phishing emails are nearly as convincing as human-crafted ones, and can be created in a …
In response to improved email security measures, cybercriminals have pivoted to more advanced attack methods, namely artificial intelligence …
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human …
The U.S. Federal Bureau of Investigation (FBI) and South Korea’s Ministry of Foreign Affairs have issued an advisory offering guidance to “the…
In the mystical realm of cyberspace, where digital forests hold secrets and virtual owls deliver messages, we find ourselves in a constant …
An increase in the number of malicious emails being sent is resulting in more phishing attacks reaching inboxes. New data clarifies the …
Several cybercriminal groups based in Vietnam are using fake job postings to trick users into installing malware, according to researchers at …
You probably expect executive leadership to not just support cybersecurity efforts, but to be involved. New data shows organizations have a …
As organizations continue to believe the malicious use of artificial intelligence (AI) will outpace its defensive use, new data focused on the…
A new technique is becoming increasingly common as a way to bypass security scanners. The challenge is that the specific execution is …
Social engineering attacks have a very long history, though the Internet has made it easier to launch these attacks en masse, according to …
As the digital landscape continues to evolve, so do the tactics of cybercriminals. The Hoxhunt Challenge, a comprehensive study conducted …
Researchers at Fortra are tracking “Strox,” one of the most popular phishing operations of the past two years. Users of Strox phishing kits …
October 18, 2023, the Cybersecurity Infrastructure and Security Agency (CISA), the National Security Agency (NSA), the Federal Bureau of…
A new report from Vade Secure has found that phishing attacks rose by 173% in the third quarter of 2023, while malware threats have increased …
Imagine a monstrous entity emerging from the shadows to prey on vulnerable organizations, leaving havoc in its wake. No, we are not talking …
Cyber insurers are claiming that cybercriminals made ransomware attacks popular again in 2023 after a slight break in 2022.
A threat actor dubbed “Void Rabisu” used social engineering to target attendees of the Women Political Leaders (WPL) Summit that was held in …
Phishing tests are the catalyst to achieve a sustainable security culture within your organization. They are actually the start of a virtuous …
This year, the world of deepfake pornography is growing at an alarming rate, thanks to advances in AI and ML. Deepfakes make it look like …
We're so excited to announce that CyberheistNews is now available on LinkedIn!
A new report sheds light on whether CISOs have been the victim of a cyber attacks, if they're every paid a ransom, their greatest cyber …
As the number of reported ransomware attacks increases, new data provides a fresh look at how ready organizations are for ransomware attacks.
As increasing percentages of businesses experience cyberattacks, new data provides details on where the most organizational risk lies.
The Wall Street Journal recently published an article about using highly-emotionally charged, “controversial”, subjects in simulated phishing …
We are excited to announce that KnowBe4 has been named a leader in the Fall 2023 G2 Grid Report for Security Orchestration, Automation, and …
A report from Trustwave notes that phishing remains one of the most popular and effective techniques for attackers to gain access to …
Roborock's online storefronts have been used for cybercrime schemes in the past, and it seems attackers are continuing to create fake online …
As attackers leave little-to-no traces of their attack patterns, more ransomware groups are shifting from automated attacks to manual attacks.
Credential harvesting has become a business in and of itself within the cybercrime economy. New insight from Microsoft details the types of …
Even though there are new attack types for cybercriminals, they are still leveraging old-school attack vectors. Why? Because they still work.
Threat actors launched 156,000 business email compromise (BEC) attempts per day between April 2022 and April 2023, according to Microsoft’s …
Real-time security coaching helps improve your organization’s security culture by enabling real-time coaching of your users in response to …
We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares security awareness training (SAT) …
Our login credentials of a username and password are sometimes all that stands between our personal identifiable information and …
Social media, and it seems particularly X (former Twitter) seems to drown in an almost instant deluge of disinformation caused by the …
Resecurity warns that the Smishing Triad threat actor has “vastly expanded its attack footprint” in the United Arab Emirates (UAE).
According to the recent The Cyber-Resilient CEO report released by IT services and consulting agency Accenture, a staggering 74% of CEOs have …
Exciting news, registration for KB4-CON EMEA 2023 is open!
As attackers evolve their toolsets and processes, the significant drop in dwell time signifies a much higher risk to organizations that now …
As insurers become more educated on what a “secure organization” looks like, they are tightening their requirements that puts the onus on …
The massive uptick in business email compromise (BEC) is considered one of the costliest attack types, requiring organizations to put …
While industries like financial services and healthcare tend to dominate in IT attacks, the tables are turned when looking at Operational …
A new report from Secureworks has found that business email compromise (BEC) remains “one of the most financially damaging online crimes …
In response to improved email security measures, cybercriminals have pivoted to more advanced attack methods, namely artificial intelligence …
Popular American global manufacturer of cleaning products Clorox stated that recent sales and profit loss to a cyber attack.
A new report shows staggering phishing trends using obfuscation techniques that should make any organization feel worried.
Gartner issued a press release that forecasted global security and risk management end-user spending to reach $188.1 billion, along with …
Cyber threats can be scary, and for good reason.
The most often recommended piece of anti-phishing advice is for all users to “hover” over a URL link before clicking on it. It is great advice.
Menlo Security warns that a social engineering campaign is using the EvilProxy phishing kit to target senior executives across a range of …
They are out there, watching and waiting for an opportunity to strike; the bad actors who have carefully researched your organization in order…
Like a ghost, most business email compromise (BEC) scams are able to sneak through most technical defenses and end up in end-user inboxes.
Threat actors continue to use generative AI tools to craft convincing social engineering attacks, according to Glory Kaburu at Cryptopolitan.
If you didn't trust contactless payment processors before, you really won't after hearing about this recent scam.
A recent attack on an undisclosed Spanish aerospace company all started with messages to the company's employees that appeared to be coming …
DomainTools is tracking an increase in SMS phishing (or “smishing”) campaigns impersonating the US Postal Service (USPS). The text messages …
Our actions determine outcomes, not our thoughts, our knowledge, or our intentions.
Check out the 66 new pieces of training content added in September, alongside the always fresh content update highlights, events and new …
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human …
Dustin Volz from the WSJ dropped a huge scoop today. This is rocket fuel infosec budget ammo I would send to my C-suite in a New York minute. …
A recent panel discussion of banking CISOs and experts at the SIBOS conference focused on the current state of ransomware and what …
The most basic use of tools like ChatGPT to script out professional-looking emails has all but eliminated improperly written content as an …
A new update on UNC3944 group's activities shows how they are evolving their focus squarely on SMiShing credential harvesting attacks that …
Insights from IBM’s Cost of a Data Breach Report on the Pharmaceutical Industry shows that while the overall cost has improved, there are …
Millions of business accounts on Facebook are the target of a new malware attack, which is seeing a success rate of 1 out of 70, causing …
Attackers are using zero-point fonts to make phishing emails appear as though they’ve been verified by security scanners, BleepingComputer …
The latest cyber claims report from Coalition, a digital risk insurance provider, finds a 12% increase in cyber insurance claims in the first …
Imagine an artificial intelligence (AI) system developed by a mad scientist to leverage the full capabilities of Large-Language-Models (LLM).
Cybercriminals are not holding back on LastPass users as a new phishing campaign has recently launched with the intent to steal your data.
Researchers at NSFOCUS are tracking a phishing campaign by a new threat actor called “AtlasCross” that’s impersonating the Red Cross in order …
Do you need an easy, automated way to provide real-time feedback the moment your users make risky mistakes to help reinforce the training …
When asked why he robbed banks, Willie Sutton, one of the first fugitives named to the U.S. FBI’s most wanted list, reportedly replied, “Because …
You're no stranger to the complexities of safeguarding your organization's digital assets. But have you considered the human element in your …
Securonix is tracking a phishing campaign that’s targeting the Ukrainian military with malware-laden attachments posing as drone instruction …
I am a strong believer that understanding cybersecurity as part of an organization-wide process is of the utmost importance.
Deepfakes have emerged as a serious concern in the digital landscape, presenting a significant threat to truth and trust.
The hospitality sector is seeing a new wave of phishing attacks. These new attacks are more plausible because they begin with compromised …
Recent findings in a SpyCloud report shows companies are starting to recognize and shift their priorities to defend against ransomware …
ZeroFox warns that phishing-as-a-service (PhaaS) offerings are increasingly including features to bypass multi-factor authentication.
What do cheese, fish and cybersecurity training have in common? Each of these comes together to help keep kids informed about cyber threats …
Security researchers at Check Point have discovered yet another attack that leverages legitimate web applications to host attacks in order to …
A new report uncovers the scope and sophistication found in just one cybercrime vendor’s business that has aided credential harvesting and …
Seen Christopher Nolan's movie Inception? If you haven't, it's about a thief who is given the task of planting an idea into the mind of a CEO.…
WIRED just published an article that made me both disappointed and surprised at the same time. Security researchers found USB-based Sogu …
[BUDGET AMMO] Jeremy King is a partner at Olshan Frome Wolosky. He wrote an article for Bloomberg where he analyzed cyber risk management …
Researchers at Barracuda describe how attackers use legitimate email inbox rules to control compromised accounts and evade detection.
Now entering its third year in business, the phishing platform, Classicam, represents the highest evolution of an “as a service” cybercrime, …
A new SMS-based phishing attack uses a smishing kit-as-a-service to impersonate the U.S. Postal Service.
New data on the state of cyber insurance shows that it’s becoming more difficult to get a policy, and the organizations obtaining one share …
There’s been a surge of Elon Musk-themed cryptocurrency scams on TikTok, BleepingComputer reports. The scammers inform the victims that they …
The latest data from IBM shows that the average cost of a data breach has gone up by 2% to a whopping $4.45 million. You would think that in …
WASHINGTON – In a startling revelation, FBI Director Chris Wray disclosed at a recent conference that China's cyber espionage capabilities are…
Scammers are using dating sites to lure victims into phony cryptocurrency investment schemes, according to Sean Gallagher at Sophos.
The International Joint Commission (ICJ), an organization that handles water issues along the Canada–United States border, was hit by a …
Now there's a super easy way to keep malicious emails away from all your users through the power of the KnowBe4 PhishER platform!
Dallas Mavericks owner and well-known investor Mark Cuban reportedly lost nearly $900,000 in a phishing attack targeting his MetaMask …
Do you want to bridge the gap between IT, cybersecurity, and the business to enhance collaboration and integration? Are you seeking a solution…
A new report takes an exhaustive look at how cybersecurity professionals see the current and future state of attacks, and how well vendors are…
A malwareless and linkless phishing attack uses sextortion and the threat of legal action to get the attention of potential victims and get …
The United States FBI, NSA, and CISA have released a joint report outlining the various social engineering threats posed by deepfakes.
Establishing urgency through a false need to “upgrade” or lose services, this new attack takes advantage of the widespread use of the popular …
Out of the over 350 brands regularly impersonated in phishing attacks, Microsoft continues to stand out because they provide attackers with …
A report from cybersecurity consultancy Savanti reveals that board members are facing challenges in understanding cyber risks, and this has …
Four days later, $52 million in lost revenues and counting, a cyber attack on MGM Resorts International, a $14 billion Las Vegas gaming empire…
As the aftermath unfolds, the details around the recent attack on MGM Resorts, providing crucial insight into the attacks impact, who’s …
Cybercriminals can't ascertain your phone password just from a Wi-Fi signal, but they can come close according to a method described in a …
Researchers at Cyfirma outline trends in phishing campaigns around the world, finding that Singapore is disproportionately targeted by …
The Associated Press (AP) has disclosed a data breach affecting the legacy AP Stylebook website that led to phishing attacks against impacted …
Phishing attacks have always been detected through broken English, but now generative artificial intelligence (AI) tools are eliminating all …
In the movie, "Willy Wonka and the Chocolate Factory," kids unwrap chocolate bars in hopes of winning a golden ticket, giving the holder an …
Researchers at Truesec are tracking a phishing campaign that’s distributing the DarkGate Loader malware via external Microsoft Teams messages.
The Interisle Consulting Group has published a paper looking at the phishing landscape in 2023, KrebsOnSecurity reports. Notably, Interisle …
Organizations have started to recognize the importance of tying executive pay to cybersecurity metrics. This practice is gaining traction …
The Telekopye toolkit allows scammers to create phishing websites, send fraudulent SMS messages and emails, and target popular Russian and …
The use of lookalike domains has reached critical mass with not just one counterfeit website, but many.
New data suggests that the gangs and toolkits behind current ransomware attacks are materially improving their abilities, resulting in a …
Inadequate authentication measures leave your digital identity vulnerable to cybercriminals. Tools like multi-factor authentication, …
Identity and authentication management provider Okta has warned of social engineering attacks that are targeting IT workers in an attempt to …
The US Cybersecurity and Infrastructure Security Agency (CISA) has warned that scammers are exploiting the recent hurricanes that have hit the…
I frequently write about authentication, including PKI, multi-factor authentication (MFA), password managers, FIDO, Open Authentication, and …
While spam tends to be dismissed as being more an annoyance, new research shows that there is a very real and ever-present threat in emails …
New data shows a massive uptick in attacks across all industries, but a particularly worrisome growth in interest in targeting the public …
British Intelligence has come up with a potentially very effective means to disrupt ransomware attacks, but there seems to still be a few …
As Phishing as a Service (PhaaS) kits continue to evolve, news like recent attacks using the Greatness toolkit demonstrate how easy it is for …
We heard you, and we're thrilled to tell you about the all-new Content Manager feature for KMSAT!
A recent survey by Lookout, Inc. warns for a specific attack vector as Labor Day approaches. The study shows that 85% of enterprise employees …
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human …
Customers of the bankrupt cryptocurrency exchange FTX are already receiving phishing emails following a breach of personal data held by …
No surprise: phishing attacks are on the rise, and a new technique is becoming increasingly popular: open redirect flaws. These flaws allow …
Researchers at Trustwave are tracking an increase in the use of QR codes to spread phishing links.
In the drive to build a strong security culture, security awareness and compliance training should work hand in hand.
Researchers at Trustwave have published a report outlining trends in business email compromise (BEC) attacks, finding that these attacks …
What's the Deal with Callback Phishing?
Check out the 21 new pieces of training content added in August, alongside the always fresh content update highlights, events and new features.
Users of the language learning app Duolingo should be wary of targeted phishing attacks following a recent data leak, according to Anthony …
Continuing coverage of IBM’s recently-released Cost of a Data Breach report, we focus on the impact attacks involving social engineering have …
A new report from Rapid7 has found that the number of ransomware attacks increased by 69% in the first half of 2023. Rapid7 incident response …
The number one way that hackers and malware compromise people, devices, and networks is social engineering. No one argues that anymore, but it…
In last few years, cyber espionage has taken a new form. A recent investigation by The Times has unveiled a Chinese intelligence officer's …
After you come to grips with the massive average cost of a data breach to an enterprise organization measured in the millions, it’s time to …
It appears that one of the most regulated industries also holds the title for the highest average data breach costs – coming in at just under …
As phishing attacks continue to dominate as an initial attack vector, new data shows that attackers maintain the use of tried-and-true …
Monitoring of traffic to phishing pages hosted on the free hosting service Cloudflare R2 show an unheard of spike of 6100%, many going …
The Australian Taxation Office (ATO) has warned of an increase in SMS and email phishing attacks targeting taxpayers, News.com.au reports. The…
Phishing attacks are on the rise in Australia, the Australian Broadcasting Corporation (ABC) reports.
During my two years as the CEO of a Public Company, Bloomberg became one of my go-to sources for financial news. I am still subscribed and …
The UK government’s voter registration website is causing confusion again, according to Ax Sharma at BleepingComputer. The site, hosted at a …
According to a new report, cybercriminals are making full use of AI to create more convincing phishing emails, generating malware, and more to…
New analysis of the second quarter of this year makes it clear that individuals and organizations alike are at an increasing risk of web- and …
Social platforms are the current favorite target of cybercriminals, displacing financial institutions, providing cybercriminals with …
New reports show many LinkedIn users have reported complaints about accounts being taken over by bad actors.
Grab a cup of coffee, and let's talk about something that's been making waves in the cybersecurity world: ransomware. You've probably heard …
The Knight ransomware-as-a-service offering (formerly known as “Cyclops”) is using phony TripAdvisor complaints to deliver its malware, …
Get the resources you need to help keep your users safe from malicious social engineering attacks during this year's Cybersecurity Awareness …
For the fourth consecutive year, we received a Tech Cares Award from TrustRadius! This fourth annual award celebrates companies that have gone…
We previously reported independently on PDF-based phishing attacks skyrocketing and the rise of SEO attacks. A recent research study found …
Law firms are being targeted by a large number of social engineering attacks involving the Gootloader malware delivery tool, according to …
TL;DR - The future of finance is intertwined with artificial intelligence (AI), and according to SEC Chair Gary Gensler, it's not all …
Now there's a super easy way to keep malicious emails away from all your users through the power of KnowBe4 PhishER Plus!
Most social engineering scams search out their potential victims, often sending emails to known email addresses, sending chat messages to them…
The second quarter of this year has become the focus of some new firsts in ransomware attacks, according to new data from cybersecurity vendor…
Cybercriminals used the legitimacy of Salesforce’s email gateway to bypass security scanners and target Meta customers in an effort to steal …
The latest data from Comcast Business’ analysis of over 23.5 billion cyber attacks on their business customers shows the importance and role …
At Black Hat USA 2023, a session led by a team of security researchers, including Fredrik Heiding, Bruce Schneier, Arun Vishwanath, and Jeremy…
The Cyberwire reported: "Victor Zhora, deputy chairman and chief digital transformation officer at Ukraine's State Service of Special …
We know that scam calls (aka vishing) and scam SMSs (aka smishing) are out of control, and for most unaware Australians, they continue to …
A record 2,322 scams in Japan to steal internet banking IDs and passwords have resulted in unauthorized money transfers totaling a record of …
With its wide use and trusted state among WordPress developers and website admins, a new campaign impersonating the website security brand …
As the retirement countdown for the current version of PCI is now less than six months, a new standard for password length, complexity, and …
Scammers are taking advantage of Twitter’s rebranding to “X,” according to Stephanie Adlam at Gridinsoft. A phishing campaign is targeting …
As a security awareness practitioner, keeping your pulse on industry - and geographical - benchmarking data and best practices is always a …
Most organizations are still using weak forms of multi-factor authentication (MFA), a survey by Nok Nok has found. These forms of MFA can be …
In today's world, cybercriminals are learning to harness the power of AI. Cybersecurity professionals must be prepared for the current threats…
KnowBe4's latest reports on top-clicked phishing email subjects have been released for Q2 2023. We analyze 'in the wild' attacks reported via …
A few weeks ago, GitHub posted on their blog a recent security alert that should have any organization in the tech industry worried.
Many of us have received a phone call or other notification from a credit card company telling us that they’ve detected suspicious activity on…
A recap of Q2 from Cisco Talos’ incident response services provides insight into exactly what kinds of attacks are being seen in the field, …
Seeking very large paydays, Vendor Email Compromise (VEC) threat actors are finding out what works and repurposing their content and processes…
As traditional phishing attack attachment types like Office documents dwindle in use, threat actors look for new effective ways to use email …
Staying one step ahead of cybercriminals is absolutely vital in today’s threat landscape. That's why we're thrilled to introduce PhishER Plus,…
WIRED just came out with an article that spells out the coming tsunami of highly targeted disinformation. here is a short summary and the …
Assisting with the creation of spear phishing emails, cracking tools and verifying stolen credit cards, the existence of FraudGPT will only …
Microsoft's recent blog post raised eyebrows through the cybersecurity community. State-backed hackers linked to Russia, known as APT29 or …
There is no such thing as a vacation for cybercriminals. We recently released our top summer cybersecurity travel tips to help keep you safe. …
Researchers at BlueVoyant warn that attackers are increasingly adding an extra step to their phishing campaigns, impersonating third-parties …
Artificial Intelligence (AI) has come roaring to the forefront of today’s technology landscape. It has revolutionized industries and will …
A US hospital closed two years after a ransomware incident, highlighting that the health sector continues to be under threat.
Drata is KnowBe4’s preferred compliance automation platform for KnowBe4 customers.
Researchers at CYFIRMA warn that the Bahamut threat actor is using a malicious Android app to deliver malware.
Researchers at Akamai describe a credential phishing campaign that’s been running since at least March 2022. Due to the volume of traffic to …
We've reported on several Amazon scams, but for once, there is positive news. Amazon sent an email Thursday morning highlighting the top scams…
The US Cybersecurity and Infrastructure Security Agency (CISA) has found that compromise of valid accounts and spear phishing attacks were the…
Google announced an update to their inactive account policies in May. Accounts that have been inactive for a period of two years or more will …
Researchers from Carnegie Mellon University and the Center for A.I. Safety have discovered a new prompt injection method to override the …
Check out the 28 new pieces of training content added in July, alongside the always fresh content update highlights, events and new features.
What happened? The SEC (Securities and Exchange Commission) has introduced new rules that require public companies to be more transparent …
Fraudsters are spreading scams on Facebook that pose as ads for legitimate AI tools, according to researchers at Check Point. The Facebook …
Amid potential concerns by governments, customers, and prospects about ties with the Russian government, the cybersecurity vendor Group-IB …
New data focused on the first half of the year shows some anomalies. Phishing attacks are slowing down… that is, until you dive into the …
This blog was co-written by KnowBe4's Data-Driven Defense Evangelist Roger A. Grimes and Chief Learning Officer John Just. Social engineering…
Linking compliance training to specific outcomes is hard. Compliance training has a reputation for being challenging for organizations to …
IBM Security has released its annual Cost of a Data Breach Report, revealing that the global average cost of a data breach reached $4.45 …
Scammers are taking advantage of the popularity of the Barbie movie, according to researchers at McAfee.
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human …
For over 25 years, a technology utilized for vital data and voice radio communications globally has remained under wraps, preventing in-depth …
A new social engineering campaign tracked as “FakeSG” is distributing the NetSupport remote access Trojan (RAT) via phony browser updates, …
The US Federal Bureau of Investigation (FBI) has warned of an increase in tech support scams that attempt to trick users into sending cash via…
H Layer Credentialing is launching an updated exam form with new content and they need YOUR help! They are looking for professionals …
Microsoft was the most impersonated brand in phishing attacks during Q2, 2023, according to Check Point’s latest Brand Phishing Report.
A new report focused on the healthcare sector sheds light on the state of cyber attacks in the European Union, including the types of attacks,…
The latest data from the FBI’s Internet Crime Complaint Center (IC3) ups the estimate for the cost of losses and exposure through business …
New data from the Identity Theft Resource Center (ITRC) covering the first half of this year shows a significant rise in the number of …
The only constant is change. That is true for physics, for organizations, and for us humans. People join and leave teams, and of course also …
Cybercriminals are exploiting the introduction of “.ZIP” as a new generic Top-Level Domain (gTLD) to launch phishing attacks, according to …
KnowBe4 offers the world’s largest library of always-fresh security awareness and compliance training content that includes assessments, …
CyberWire wrote: "Researchers at SlashNext describe a generative AI cybercrime tool called “WormGPT,” which is being advertised on underground…
Do you need an easy, automated way to provide real-time feedback the moment your users make risky mistakes to help reinforce the training …
KnowBe4 ranks number one overall on the 2023 Technology Top Workplaces list for the third consecutive year and earns national recognition as …
New insight from blockchain analysis company, Chainalysis, shows that activity involving known ransomware crypto addresses has grown over the …
The quantity of emails involved in scams and cyber attacks continues to grow as credential theft and response-based phishing persist as top …
A new scam aimed at stealing your credit card and banking information has reared its’ ugly head as a completely legitimate ad that is likely …
PoisonGPT works completely normally, until you ask it who the first person to walk on the moon was.
Researchers at Check Point outline various forms of tailgating attacks. These attacks can allow threat actors to bypass physical security …
As the rate of ransomware attacks steadily increased over time, there are clear indicators as to how these attacks are starting and, …
Using a new twist to bypass detection from security solutions, cyber attacks are now employing what will be construed as a benign image whose …
Researchers at Veriti have observed hundreds of spoofed domains following Meta’s launch of its Threads social media platform.
On July 10th, the EU Commission adopted anadequacy decision for the proposed EU-U.S. Data Privacy Framework. This is exciting news for …
A phishing campaign is targeting the tourism and hospitality industries, according to researchers at Votiro.
Australia officially launched their National Anti-Scam Centre this week. With more than AUD $3.1 billion lost each year, Australians need …
Job scams are a rising form of socially engineered cybercrime. And while it’s easy to imagine the trouble they cause individuals who …
Cybercriminals continue to rely on proven attack methods while developing new ways to infiltrate digital environments and break through your …
The latest data provided by the Singapore Cyber Emergency Response Team (SingCERT) shows the number of attacks trending in the wrong …
The British national responsible for hacking into and impersonating high-profile individuals as part of a crypto theft scheme has been …
From the “shaking our heads” files comes the story of how threat actors compromised military personnel mobile devices, credentials, accounts …
Apparently expanding efforts outside of Southeast Asian countries, this threat group’s known malware has shown up in a European healthcare …
An abnormally massive focus on business email compromise attacks in Europe has fueled an equally large growth in overall email attacks there, …
A new threat alert from ConsumerAffairs and TrendMicro proves more than just shoppers will take advantage of Amazon’s upcoming Prime Day.
If your organization uses Microsoft Teams, then you definitely want to hear about a new way bad actors are exploiting this newly discovered …
Email-based social engineering attacks have risen by 464% this year compared to the first half of 2022, according to a report by Acronis. …
Ransomware continues to be a major threat for all organizations and, according to the Verizon 2023 Data Breach Investigations Report, is still…
Attackers are increasingly using images in phishing to evade text-based security filters, according to researchers at INKY.
The largest port in Japan, Nagoya, is now the most recent victim of a ransomware attack.
CyberheistNews Vol 13 #27 | July 5th, 2023 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands …
We are excited to announce that KnowBe4 has been named a leader in the Summer 2023 G2 Grid Report for Security Orchestration, Automation, and …
We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) …
The Better Business Bureau (BBB) has warned of a scam in which attackers pose as process servers in order to steal information and commit …
July is Ransomware Awareness Month, and we’ve got you covered with free resources!
Check out the 34 new pieces of training content added in June, alongside the always fresh content update highlights, events and new features.
New analysis shows sources of cryptocurrency being placed into mining pools with huge deposits that make it easier for cybercriminals to make …
As executables and scripts are unable to bypass security solutions as attachments, cybercriminals turn to HTML as a means of obfuscation and …
The Iranian threat actor Charming Kitten is launching sophisticated spear phishing attacks to distribute a new version of its POWERSTAR …
When KnowBe4 went public in April 2021, I got to know a select group of analysts that served as co-managers on our IPO. These professionals …
In the most recent Cyber Threat report from the National Cyber Security Centre (NCSC), it is clear that UK law firms are a gold mine for …
First National Bank has warned of an increase in phishing and smishing attacks, IT-Online reports.
A year-long phishing campaign has been uncovered that impersonates 100+ popular clothing, footwear, and apparel brands using at least 10 fake …
CyberheistNews Vol 13 #26 | June 27th, 2023 [Eyes Open] The FTC Reveals the Latest Top Five Text Message Scams The U.S. …
Russia’s APT28 (also known as “Fancy Bear” or “BlueDelta”) is using spear phishing to compromise Ukrainian government and military entities, …
The “Singapore Cyber Landscape (SCL) 2022” reviews Singapore’s cybersecurity situation in 2022 against the backdrop of global trends and …
Whether it is reporting a phishing email or something that might be illegal that a coworker is doing, your employees should be a strong last …
A phishing campaign is impersonating cryptocurrency trading platform Coinbase, Tech.co reports. Crypto trader Jacob Canfield described the …
According to an internal email obtained by CNN, the CEO of SolarWinds informed employees on Friday that the company plans to vigorously defend…
There are many ways to be socially engineered and phished, including email, websites, social media, SMS texts, chat services, phone calls and …
Using credibility-building imagery and creating a need for the user to click what may or may not be perceived as an image is apparently all it…
Using an external platform trusted by potential victims is proving to be a vital tool in the cybercriminal’s arsenal. New data shows the state…
New data shows that even with the majority of organizations experiencing cyber attacks, three hours of security awareness training simply …
A threat actor tracked as “Muddled Libra” is using the 0ktapus phishing kit to gain initial access to organizations in the software …
A researcher was alerted to a fake website containing fake quotes that appeared to be written by himself. The age of generative artificial …
The U.S. Federal Trade Commission (FTC) has published a data spotlight outlining the most common text message scams in 2022. Phony bank fraud …
Cybercriminals still know that the easiest way to successfully infiltrate an organization is through its people.
CyberheistNews Vol 13 #25 | June 20th, 2023 [Fingerprints All Over] Stolen Credentials Are the No. 1 Root Cause of Data …
Legitimate services can be exploited in social engineering, including business email compromise (BEC) attacks. Researchers at Check Point …
Details from a simple impersonation phishing attack show how well thought out these attacks really are in order to heighten their ability to …
The recent conviction of a U.K. man for cyber crimes committed in 2018 brings to light a cyber attack where this attacker manually performed …
A survey by PasswordManager.com has found that one in three job seekers has fallen for, and responded to, fake job scams over the past two …
Real-time security coaching helps improve your organization’s security culture by enabling real-time coaching of your users in response to …
The French government is taking a stand against the increasing threat of digital warfare. Publicly accusing Russia of conducting an extensive …
While artificial intelligence (AI) has been the hot topic of this year, a theme that I continue to see is that AI is being used for good …
A phishing campaign is spoofing the major German media conference Anga Com, according to Jeremy Fuchs at Avanan.
Ransomware attacks are as pervasive as ever, with new data demonstrating just how impactful the attacks really are.
As government-sponsored and widespread vulnerability attacks continue to result in larger damages, cyber insurers are looking for …
Microsoft describes a sophisticated phishing campaign that targeted several financial organizations.
CyberheistNews Vol 13 #24 | June 13th, 2023 [The Mind's Bias] Pretexting Now Tops Phishing in Social Engineering Attacks…
What really makes a “strong” password? And why are you and your end-users continually tortured by them? How do hackers crack your passwords …
New data puts the spotlight on the human factor in U.K. cyber attacks, where users continue to be susceptible to social engineering, creating …
Wouldn’t it be great if your cybersecurity strategy only had to focus on just a few threats? Sigh… if only life were that easy. But new …
New data makes it crystal clear that spear phishing is a real problem… and organizations may not properly be prepared to detect and address it.
The Wall Street Journal today revealed that North Korea's hacker army managed to steal a huge amount of cryptocurrency amounting to $3 billion…
Verizon's DBIR always has a lot of information to unpack, so I’ll continue my review by covering how stolen credentials play a role in attacks.
While your users are getting ready for their next beach vacation, cybercriminals are preparing for their opportunity to strike. Check Point …
We occasionally learn of articles and papers that claim that security awareness training and/or simulated phishing campaigns are not …
The New Verizon DBIR is a treasure trove of data. As we covered here, and here, people are one of the most common factors contributing to …
People are one of the most common factors contributing to successful data breaches. Let’s dive in deeper into the latest Verizon Data-Breach …
A Chinese-speaking phishing gang has expanded its targeting from the Asia-Pacific region to the Middle East, researchers at Group-IB have …
My analysis of this year’s newly-released Verizon Data Breach Investigations Report begins with ransomware findings that point back to users …
For years, KnowBe4 has been a long-time proponent of everyone using PHISHING-RESISTANT multi-factor authentication (MFA) whenever possible.
The U.S. and South Korean governments have issued a joint advisory outlining a North Korean phishing campaign, The Register reports. The …
CyberheistNews Vol 13 #23 | June 6th, 2023 [Wake-Up Call] It's Time to Focus More on Preventing Spear Phishing Fighting …
Today, the FBI alerted warned against a new even more disgusting type of sextortion. Previously, these schemes involved coerced or stolen …
A phishing campaign is using hyperlinked images in order to trick users into visiting malicious sites, according to Jeremy Fuchs at Avanan. …
All, I thought it was necessary to have an independent, vendor-neutral Cert so we would have a real Certified Security Awareness and Culture …
Forced verification fraud and deepfake fraud are on the rise in the US and Canada, according to researchers at Sumsub. Pavel Goldman-Kalaydin,…
A new study found that ChatGPT can accurately recall any sensitive information fed to it as part of a query at a later date without controls …
As digital transformation continues to shape the healthcare industry, it is crucial for healthcare organizations to prioritize cybersecurity. …
Fighting spear phishing attacks is the single best thing you can do to prevent breaches.
CyberheistNews Vol 13 #22 | May 31st, 2023 [Eye on Fraud] A Closer Look at the Massive 72% Spike in Financial Phishing …
50% of organizations surveyed were victims of spear phishing attacks in the last twelve months, according to a new report from Barracuda. The …
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has identified and designated Mikhail Matveev for his role in …
As audio deepfake technology continues to go mainstream as part of the evolution in AI-based tools, new data shows there are plenty of victims…
Brian Krebs wrote: "A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were…
Found this highly amusing article: Legal Twitter is having tremendous fun right now reviewing the latest documents from the case Mata v. …
At KB4-CON 2023, we had a customer panel that I hosted discussing the connection between security and compliance training content when trying …
Threat actors are using encoded phishing links to evade security filters, according to Jeremy Fuchs at Avanan. The phishing emails purport to …
As the world continues to evolve, so does the nature of warfare. China's People's Liberation Army (PLA) is increasingly focused on "Cognitive …
Check out the 20 new pieces of training content added in May, alongside the always fresh content update highlights, events and new features.
Verizon has renewed its warnings to customers about the threat of smishing, a social engineering approach that relies upon texts as opposed to…
Egress, a cybersecurity company that provides intelligent email security, recently released their Email Security Risk Report 2023.
With attackers knowing financial fraud-based phishing attacks are best suited for the one industry where the money is, this massive spike in …
Malign persuasion can take many forms. We tend to hear the most about phishing (malicious emails) or smishing (malicious texts). Other threats…
New data shows that changes in cybercriminals’ phishing techniques are improving their game, making it easier to make their way into a …
As you all know, KnowBe4 frequently promotes security awareness training and we also mention that unpatched software is a distant number two …
CyberheistNews Vol 13 #21 | May 23rd, 2023 [Double Trouble] 78% of Ransomware Victims Face Multiple Extortions in Scary …
Microsoft has observed a thirty-eight percent increase in cybercrime-as-a-service (CaaS) offerings for launching business email compromise …
The Insider reported that an apparently AI-generated photo faking an explosion near the Pentagon in D.C. went viral. The Arlington Police …
One of KnowBe4's long-term employees just send me a picture this morning of a postcard that sure looks like it's phishing, the good …
According to QRTIGER, an online QR code generator company, dynamic QR code scans increased 433% globally from 2021 to 2022. In 2022, the FBI …
Google has recently introduced a set of new top-level domains: .dad, .esq, .prof, .phd, .nexus, .foo, .zip and .mov. They’re now available for…
Food for thought as discussed on May 18, 2023, an article posted in The Australian Insurance Council: Banning paying a ransom to cyber hackers…
A new report covering 13 global markets highlights phishing prevalence and its role in cyber attacks when compared to other types of attacks.
This new phishing toolkit is rising in popularity for its effective realism in impersonating not just Microsoft 365, but the victim …
For all the recent focus on artificial intelligence and its potential for deepfake impostures, the boiler room is still very much active in …
We are thrilled to announce we have reached a milestone of 60,000 customer organizations globally, consisting of tens of millions of end …
The latest Phishing Activity Trends Report from the Anti-Phishing Working Group (APWG) shows an unrelenting upward trend in the number of …
CyberheistNews Vol 13 #20 | May 16th, 2023 [Foot in the Door] The Q1 2023's Top-Clicked Phishing Scams | INFOGRAPHIC …
The Associated Press warned this week that AI experts have raised concerns about the potential impact of deepfake technology on the upcoming …
A new report highlights the direct connection between how strong your organization’s security stance is and how easy it is to obtain cyber …
The US Federal Trade Commission has issued an alert warning of phishing campaigns that are impersonating PayPal and the MetaMask cryptowallet.
New data sheds light on how likely your organization will succumb to a ransomware attack, whether you can recover your data, and what’s …
Midsize and enterprise organizations take notice: the average and median amount of a ransom payment and the median size of the victim …
As cyber attacks continue to grow in sophistication and frequency, cyber insurers are expecting their market to double in the next two years.
A phishing (by email) and smishing (by SMS text) operation in Madrid, Seville and Guadalajara has been taken down by the National Police of …
As cyber attacks continue to grow in sophistication, frequency, cyber insurers are expecting their market to double in the next two years.
New data from the U.K.’s Office of National Statistics shows that this often overlooked scam has grown significantly in interest – likely …
New data shows a resurgence in successful ransomware attacks with organizations in specific industries, countries and revenue bands being the …
The once-in-a-lifetime royal occurrence sparked countless websites designed to steal personal information and credit card details, causing …
A newly identified criminal organization has been observed running a large number of business email compromise (BEC) scams. Since February …
We are proud to announce that TrustRadius has recognized KnowBe4 with a 2023 Top Rated Award.
The Five Eyes member nations' cybersecurity and intelligence agencies dismantled the infrastructure of the Snake cyber-espionage malware that …
KnowBe4's latest reports on top-clicked phishing email subjects have been released for Q1 2023. We analyze 'in the wild' attacks reported via …
The InterPlanetary File System (IPFS), a distributed file-sharing system that represents an alternative to the more familiar location-based …
CyberheistNews Vol 13 #19 | May 9th, 2023 [Watch Your Back] New Fake Chrome Update Error Attack Targets Your Users …
Unfortunately ransomware attacks have taken another victim. The City of Dallas recently confirmed that their police department suffered a …
The evidence is clear – there is nothing most people and organizations can do to vastly lower cybersecurity risk than to mitigate social …
The U.S. government created a new office to block disinformation. The new Foreign Malign Influence Center (FMIC) oversees efforts that span …
The Cyberwire reported: "Barracuda released a study this morning indicating that HTML attacks have doubled since last year.
Phishing attacks have come a long way from the spray-and-pray emails of just a few decades ago. Now they’re more targeted, more cunning and …
Do you spend too much time creating custom security awareness reports for your C-suite or board of directors? If so, we’re happy to share our …
According to a recent EY survey, nearly 80% of business leaders are increasing their cybersecurity investment in the next six to 12 months.
The malwareless and seemingly benign nature of business email compromise emails, mixed with impersonation techniques, are difficult to spot as…
New data highlights just how frequently cyber attacks are attempted and organizations are impacted - and the numbers are far more surprising …
March saw a huge jump in ransomware compared to January and February, signifying that organizations should expect to see a lot more of these …
Walmart’s rise to become the brand most likely to be impersonated in Q1 of this year is a real problem.
The most common route for malware infections remains social engineering in its various forms: phishing, vishing, etc. Such approaches take …
It's May the 4th, a holiday that celebrates our love for a galaxy far, far, away - Star Wars! I can't help but share some cybersecurity …
It's World Password Day! This holiday is to ensure everyone always practices good password hygiene. This year, we wanted to share the best …
I get the WSJ Cybersecurity newsletter, which by the way is warmly recommended. Kim Nash today reported a shocker which will make everyone's …
Bloomberg's Brad Stone wrote an op-ed covering this topic. In the past month, a chatbot called "My AI" or "Sage" has appeared as a new friend …
Compromised websites (legitimate sites that have been successfully compromised to support social engineering) are serving visitors fake Google…
CyberheistNews Vol 13 #18 | May 2nd, 2023 [Eye on AI] Does ChatGPT Have Cybersecurity Tells? Poker players and other …
Since the beginning, two types of computer attacks (known as initial root cause exploits) have composed the vast majority of successful …
Phishing is a familiar criminal tactic. It’s also used by intelligence services for cyber espionage campaigns. On Friday, April 28th, 2023, …
New data provides a multi-faceted look at the changing face of phishing attacks. This data includes who’s being targeted, the tactics being …
Security teams face unique challenges in today’s rapidly-changing landscape of phishing, malware, and other social engineering and …
Check out the 19 new pieces of training content added in April, alongside the always fresh content update highlights, events and new features.
Wired just published an interesting story about political bias that can show up in LLM's due to their training. It is becoming clear that …
It was all over the news. Fed's Jerome Powell was social engineered by Russian pranksters posing as Zelensky.
Poker players and other human lie detectors look for “tells,” that is, a sign by which someone might unwittingly or involuntarily reveal what …
QBot malware seems to be outliving its competitors through innovative new ways to socially engineer victims into helping install it.
A new impersonation scam targets users of the popular pay platform under the guise of the victim having money coming to them and with the goal…
A new survey points to an overconfidence around organization’s preparedness, despite admitting to falling victim to ransomware attacks – in …
New data shows how poorly organizations are at identifying – let alone removing – an attacker's foothold, putting themselves at continued risk…
Money mules play a subordinate but important role in the criminal economy. They’re used to move stolen funds around, a low-level version of …
Researchers at Group-IB have found an extensive campaign in which criminal operators have created a large number of fake Facebook profiles …
CyberheistNews Vol 13 #17 | April 25th, 2023 [Head Start] Effective Methods How To Teach Social Engineering to an AI …
We’ve had occasion to write about ChatGPT’s potential for malign use in social engineering, both in the generation of phishbait at scale and …
You may not have heard of this service planned for July 2023, but it promises a massive new social engineering attack surface. This is from …
A FBI bulletin highlights a new twist in the sextortion game: companies claiming to assist with addressing sextortion who use deceptive social…
Social media is designed of course to connect, but legitimate modes of doing so can be abused. One such case of abuse that’s currently running…
In an interesting twist, new data hints that organizations with cyber insurance may be relying on it too much, instead of shoring up security …
The nature of an advanced artificial intelligence (AI) engine such as ChatGPT provides its users with an ability to use and misuse, …
At a time when cyber attacks are achieving success in varying degrees and IT pros are keeping quiet about resulting breaches, there is one …
New data shows that cybercriminals started this year off with a massive effort using new techniques and increased levels of attack …
The Verge came out with an article that got my attention. As artificial intelligence continues to advance at an unprecedented pace, the …
Earlier this month, state employees in the US state of New Jersey began receiving emails that falsely represented themselves as originating …
We are excited to announce that KnowBe4 has been named a leader in the Spring 2023 G2 Grid Report for Security Orchestration, Automation, and …
[BUDGET AMMO] James Rundle at the The Wall Street Journal today published a very interesting article about the long-term costs of cyber …
National Westminster Bank, the London-based bank familiarly known as NatWest, has warned its customers to be on the alert for emails …
We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) …
CyberheistNews Vol 13 #16 | April 18th, 2023 [Finger on the Pulse]: How Phishers Leverage Recent AI Buzz Curiosity leads…
The Indian Railway Catering and Tourism Corporation (IRCTC), described as “a popular platform used by a significant number of Indians for …
Remember The Sims? Well Stanford created a small virtual world with 25 ChatGPT-powered "people". The simulation ran for 2 days and showed that…
Affinity phishing scams are ones in which criminals cultivate trust in their prospective victims by trading on common background, either real …
The use of Large Language Models (LLMs) is the fine tuning AI engines like ChatGPT need to focus the scam email output to only effective …
A method used in domain impersonation attacks, combosquatting aids the threat actor by using a modified domain name to further increase the …
Anticipation leads people to suspend their better judgment as a new campaign of credential theft exploits a person’s excitement about the …
With all the overwrought hype with ChatGPT and AI…much of it earned…you could be forgiven for thinking that only the bad actors are going to …
CyberheistNews Vol 13 #15 | April 11th, 2023 [The New Face of Fraud] FTC Sheds Light on AI-Enhanced Family Emergency …
There is no doubt that ransomware is one of the top cybersecurity challenges of our lifetime. Survey after survey has revealed senior …
The human factor is involved in 82% of data breaches, according to the 2022 Verizon Data Breach Investigations Report. Cybercriminals use …
4/11/2023 - Gizmodo just dropped this eye-roll inducing news. The disgraced crypto exchange had no dedicated cybersecurity staff and …
Researchers at Securonix are tracking an ongoing phishing campaign dubbed “TACTICAL#OCTOPUS” that’s been targeting users in the US with …
KnowBe4 commissioned Forrester Consulting to conduct a Total Economic ImpactTM study* examining the potential Return on Investment (ROI) …
Check out the 49 new pieces of training content added in March, alongside the always fresh content update highlights, events and new features.
Google’s Threat Analysis Group (TAG) has published a report describing the activities of “ARCHIPELAGO,” a subset of the North Korean …
A newly documented phishing campaign demonstrates how timely themes can be impactful in creating a successful attack that gets the recipient …
A new public service announcement focuses on a specific form of BEC attack using little more than a spoofed domain and common vendor payment …
Phishing attacks that can evade detection by email scanners are improving their chances of reaching the inbox, thanks to an increase in the …
This MIT Technology Review headline caught my eye, and I think you understand why. They described a new type of exploit called prompt injection.
The FBI’s newly-released report shows just how ransomware continues to plague critical infrastructure sectors, despite the U.S. government’s …
A school principal in Volusia County, Florida has resigned after sending $100,000 to a scammer posing as Elon Musk, WESH 2 News reports. Dr. …
Cybercriminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff.…
When I was in my 30s, I woke up one morning with a terrible pain shooting down one side of my back and around the side. The pain was so …
BleepingComputer reports that a cybercriminal gang is sending phony ransomware threats to prior victims of ransomware attacks. The gang, which…
In a groundbreaking move, Italy has imposed a ban on the widely popular AI tool ChatGPT. This decision comes in the wake of concerns over …
CyberheistNews Vol 13 #14 | April 4th, 2023 [Eyes on the Prize] How Crafty Cons Attempted a 36 Million Vendor Email …
New insights from cybersecurity artificial intelligence (AI) company Darktrace shows a 135% increase in novel social engineering attacks from …
Looks like Latitude Finance is trying to give consumers more "latitude" in their exposure to cyber risks. The Australian finance company …
The Cyber Police of Ukraine have arrested twelve alleged members of an organized cybercrime group that’s stolen approximately $4.3 million …
Mid-sized businesses – those with 250 to 2000 employees – don’t appear to have what they need to fend off attacks in a number of critical ways.
New global data shows that those government employees that work solely in the office are the new minority, IT lacks visibility, and user …
Using the lure of ChatGPT’s AI as a means to find new ways to make money, scammers trick victims using a phishing-turned-vishing attack that …
The Federal Trade Commission is alerting consumers about a next-level, more sophisticated family emergency scam that uses AI that imitates the…
Cybersecurity experts continue to warn that advanced chatbots like ChatGPT are making it easier for cybercriminals to craft phishing emails …
You have probably seen it. Pope Francis in a designer puff jacket. It fooled millions of people. Culture writer Ryan Broderick called it the …
The Australian Federal Police (AFP) have arrested four alleged members of an organized crime group known for carrying out business email …
Do you need an easy, automated way to provide real-time feedback the moment your users make risky mistakes to help reinforce the training …
The US FBI is warning of business email compromise (BEC) attacks designed to steal physical goods. While BEC attacks are typically associated …
This is a disgusting topic. It's also a very high social engineering risk. I will keep this post safe-for-work, which is not easy. NBC news …
I remember sitting in Stu Sjouwerman’s office with Perry Carpenter and myself being pitched a drama series about cyber security by Jim Shields…
We’re thrilled to announce the long-awaited fifth season of the award-winning KnowBe4 Original Series - “The Inside Man” is now available in …
CyberheistNews Vol 13 #13 | March 28th, 2023 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks Users need to…
Younger employees need to be wary of oversharing company information on social media, according to John Karabin, senior director of …
It seems that once again bad actors have found a new way to infect our devices with malware. This time, they are using a devious little trick …
The details in this thwarted VEC attack demonstrate how the use of just a few key details can both establish credibility and indicate the …
A report from Palo Alto Networks’ Unit 42 found that data theft extortion occurred in 70% of ransomware attacks in 2022, compared to 40% in …
In recent years, cybercrime has evolved to become more sophisticated than ever before. One of the up and coming methods used by criminals is …
Linking compliance training to specific outcomes is hard. Compliance training has a reputation for being challenging for organizations to …
Do you ever feel like you are always playing catch up regarding cybersecurity? That it is a never-ending game; no matter what you do, you are …
New data shows that phishing mobile devices as an attack vector is growing in popularity – mostly because it’s increasingly working... in …
As cyber insurers become more experienced in what kinds of claims are being presented, and the threat action details therein, specific types …
New data on the current state of cybersecurity shows that organizations are experiencing challenges, falling behind, and seeing the impact of …
As scammers continue to see massive returns on their phishing attacks, the use of impersonation with well-known brands continues to circle …
A journalist based in Ecuador recently used a USB flash drive that was actually a legitimate bomb.
Users need to adapt to an evolving threat landscape in which attackers can use AI tools like ChatGPT to craft extremely convincing phishing …
I get asked all the time to “predict” the future of cybercrime. What will be the next big cyber attack? What will be the next paradigm …
Researchers at ReliaQuest warn that organizations should continue to be on the lookout for social engineering attacks related to Silicon …
CyberheistNews Vol 13 #12 | March 21st, 2023 [Heads Up] This Week's New SVB Meltdown Social Engineering Attacks On …
A new law in Québec, Canada, that goes into effect this June will require all policies and training materials assigned to employees within …
Yikes. Loz Blain at NewAtlas just reported that Stanford has copied the ChatGPT AI for less than $600. The article started out with: …
Secureworks has published a report looking at cybercrime over the course of 2022, finding that business email compromise (BEC) attacks nearly …
It’s a familiar story: scam artists impersonate a trusted brand, a trusted business or a trusted authority in emails and on bogus sites …
Attackers are increasingly using techniques to prevent their phishing pages from being detected by security firms, a new report from …
Mea Culpa. When you make a mistake, admit you made a mistake.
New data looking back at the cyber attacks observed in 2022 shows that phishing continues to dominate as initial access brokers seem to be …
New data shows that not only has just about every organization experienced a successful phishing attack, but that they are also paying the …
I talk and present often about DMARC (and SPF and DKIM), including here. A lot of people who think they understand how DMARC works, do not …
Phishing emails increase in volume every month and every year, so we created this free resource kit to help you defend against attacks. …
Attackers are increasingly using techniques to prevent their phishing pages from being detected by security firms, a new report from …
As cybercriminals increasingly turn to malwareless phishing attacks, the ability for security solutions to correctly identify a malicious …
New data on the state of email security shows that nearly every organization has been the target of a phishing attack as attacks increase in …
The University of Sydney has issued advice to help students and staff avoid falling for social engineering attacks.
We’re thrilled to announce that Season 5 of the award-winning Knowbe4 Original Series - “The Inside Man” is less than a month away!
The 2022 Internet Crime Report by the FBI reported at least $10.3 billion in losses due to internet scams last year.
I’ve been doing computer security for over 34 years and in that time, I haven’t seen a lot of game-changing products. What I have seen is a …
CyberheistNews Vol 13 #11 | March 14th, 2023 [Heads Up] Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising …
DomainTools warns that a sophisticated West Africa-based fraud group is impersonating the Financial Industry Regulatory Authority (FINRA) to …
According to Microsoft's Security Intelligence team, a recent business email compromise attack (BEC) has shown that threat actors are …
Saturday March 11, 2023 -- Over the last 24 hours, the Federal Deposit Insurance Corporation has established the FDIC Bank of Santa Clara …
Regarding the current SVB meltdown, the English word "bankruptcy" has its roots in medieval Italy. It comes from the word "banca rotta," which…
A new survey of individuals across seven countries shows that users may have had luck on their side, as a majority aren’t sure about their …
A look back at the last year of attacks on Ukraine by Google’s Threat Analysis Group (TAG) provides insight into attacks on NATO countries to …
New data on cyberattacks from last quarter provides a lens of what kinds of attack techniques to expect to see from cyber attackers this year.
The education sector remains vulnerable as ransomware shame sites continue to feature teaching institutions from around the world. Some of the…
INKY warns that a phishing campaign is targeting users of the Ring video security system. The scammers are sending brief phishing emails …
Despite a lot of focus on phishing and remote access as initial access vectors, new data shows the use of vulnerabilities is not only on the …
As credential theft-focused phishing attacks continue to assist initial access brokers, new data shows banking fraud continues to be a …
Vade has released a report looking at phishing trends in 2022. The researchers say the top three most-impersonated brands last year were …
Robert Lemos at DARKReading just reported on a worrying trend. The title said it all, and the news is that more than 4% of employees have put …
ChatGPT, an artificial intelligence (AI) chatbot created by OpenAI, has risen in popularity since its release last year. Now, cybercriminals …
CyberheistNews Vol 13 #10 | March 7th, 2023 [Eye Opener] BusinessWeek: The Satellite Hack Everyone Is Finally Talking …
New data shows just how impactful these attacks are, with 98% of victim organizations reporting some form of impact from email-based cyber …
The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI last week issued a joint advisory on Royal ransomware. Royal is …
Since the goal of ransomware is to initially disrupt operations, the targeting of industrial control systems has been an increasing focus for …
Despite hearing mostly about BEC attacks in English-speaking countries, analysis of new attack groups highlight the threat of these kinds of …
Even the world’s most successful organizations have significant weaknesses in their cybersecurity defenses, which determined hackers can …
Check out the 24 new pieces of training content added in February, alongside the always fresh content update highlights, events and new …
Financial services businesses are already in the sights of cybercriminals, and understanding how cyberattacks impact this sector specifically …
So, today CISA released another ransomware notice. The Cybersecurity and Infrastructure Security Agency is an agency of the United States …
Time is the one resource you never get back. Cutting the amount of time between the moment your user reports a suspicious email and when your …
Researchers at CloudSEK have published a report looking at fraudulent customer service phone numbers in India. The researchers found around …
This morning, Bloomberg News pointed at a brand new article at BusinessWeek, one of their media properties. This is an excellent article that …
With the average cost of the most expensive successful email attack at over $1 million, it’s necessary to begin to zero in on where the …
Since phishing attacks need legitimacy to increase their deliverability, this latest twist shows how phishing scammers and hackers are working…
An international cybercriminal operation responsible for millions of dollars in business email compromise (BEC) scams has finally been …
BlackBerry has published a report on a threat actor, Blind Eagle, also known as APT-C-36, which has been operating against targets in Ecuador …
CyberheistNews Vol 13 #09 | February 28th, 2023 [Eye Opener] Should You Click on Unsubscribe? By Roger A. Grimes. Some …
Most computer security practitioners have understood for many years the importance of having an aggressive security awareness training …
Researchers at Checkmarx warn that attackers uploaded more than 15,000 packages to NPM, the open-source repository for JavaScript packages, to…
With nearly 280 million phishing emails detected by just one vendor, and the increase in the number of unique emails, organizations have a lot…
Email scammers can’t pass up a tried and true theme that is almost guaranteed to produce results. And with W-2 forms being sent out, it marks …
New cyber attack data from 2022 is providing insight into what to expect in 2023, including ransomware campaigns.
New data shows users aren’t scrutinizing emails used in business email compromise (BEC) attacks, allowing critical changes in banking details …
We received great feedback from many of you after sharing data about completion percentages last month so much that we thought, “What other …
Coinbase describes a targeted social engineering attack that led to the theft of some employee data. The attacker first sent smishing messages…
Some common questions we get are “Should I click on an unwanted email’s ’Unsubscribe’ link? Will that lead to more or less unwanted email?”
When it comes to cybersecurity, ransomware is the rockstar of threats. But taking a peek behind the curtain, business email compromise (BEC) …
Cloudflare warns that business email compromise (BEC) phishing has assumed a new form: vendor email compromise (VEC). The classic BEC case …
CyberheistNews Vol 13 #08 | February 21st, 2023 [Heads Up] Reddit Is the Latest Victim of a Spear Phishing Attack …
When should organizations be on guard against social engineering? Always, of course, but there are certain times when they should be …
The curse of knowledge is a cognitive bias that occurs when someone is trying to communicate information to another person, but falsely …
You should use phishing-resistant multi-factor authentication (MFA) when you can to protect valuable data and systems. But most biometrics and…
The Russian-based hacking group Seaborgium is at it again with increased spear phishing attacks targeting US and European countries in the …
Do you need an easy, automated way to provide real-time feedback the moment your users make risky mistakes to help reinforce the training …
The Dutch organization Supply Value (a specialist in network optimalisation) together with the website Computable, published an article on …
Cybersecurity is not just a technological challenge, but increasingly a social and behavioral one.
A survey by Tanium has found that IT security professionals in the UK say that 64% of avoidable cyber attacks are due to human error, which …
There is a lot to learn from Reddit's recent data breach, which was the result of an employee falling for a “sophisticated and …
Seemingly repeating the previous year, the FTC’s latest report highlights that nearly 70,000 people reported being the victim of a romance …
As deepfake technology continues to improve, creators of deepfake technology seek to lock down and safeguard the use of their technology after…
CyberheistNews Vol 13 #07 | February 14th, 2023 [Scam of the Week] The Turkey-Syria Earthquake Just when you think they …
Attackers are abusing a legitimate service called “GeoTargetly” to launch localized phishing attacks, according to Jeremy Fuchs at Avanan. …
Impersonation of users, domains, and brands is on the rise, as is the use of malicious links, in response to security vendors improving their …
In the wake of the rising cost of living, new scams targeting those in less-than-optimal financial situations based on “deprived” areas …
Active discussions in hacker forums on the dark web showcase how using a mixture of the Open AI API and automated bot from the Telegram …
Online surveys are too often scams designed to steal personal or financial information, warns Phil Muncaster at ESET. Muncaster explains that …
The success of the TV adaption of this PlayStation game 'The Last of Us' has been a huge hit for fans. Unfortunately, this new series has …
Insurance provider Hiscox has published its fifth annual cyber readiness report, which has some eye-opening statistics.
Just when you think they cannot sink any lower, criminal internet scum is now exploiting the recent earthquake in Turkey and Syria.
Employees need to adjust their mindsets in order to defend themselves against social engineering attacks, according to Jonathon Watson at …
With the introduction of OpenAI's Chat GPT, artificial intelligence is no longer considered part of science fiction. It has presented a new …
Now there’s a super easy way to keep malicious emails away from your users through the power of the KnowBe4 PhishER platform!
On Sunday, I received an urgent message from a friend. PayPal had sent him an email saying that a co-worker had sent him money. This was not …
A phishing campaign is targeting college students with phony part-time job opportunities, according to Jeremy Fuchs at Avanan. The emails …
Check out the 39 new pieces of training content added in January, alongside the always fresh content update highlights, events and new features.
Completely absent from the top 10 brands for more than two years, Yahoo’s impersonation may indicate that scammers are looking for new attack …
A threat actor tracked as DEV-0569 appears to be using a combination of Google Ads and impersonated websites to compromise credentials and …
A business email compromise (BEC) gang has launched more than 350 attacks against organizations in the US, according to researchers at …
KnowBe4 is proud to be recognized by TrustRadius in the “Best Of” Awards for overall, best feature set, best relationship, and best value for …
Artificial intelligence (AI) is no longer science fiction.
A large scam campaign is targeting users on LinkedIn and other social media platforms posing as financial advisors, according to researchers …
New analysis of December and January emails shows massive spikes in attacks aimed at stealing personal information and credit cards under the …
Threat actors are using malicious attachments in OneNote in order to distribute malware, BleepingComputer reports. The attackers attach VBS …
New data showcasing the state of ransomware shows that while organizations are likely getting better at recovery (and not paying the ransom), …
With Microsoft disabling macros by default on Office documents, cybercriminals are left needing another means to launch malware that’s …
At least two federal civilian agencies were the unfortunate victims of a refund scam campaign, perpetrated through the use of remote …
The UK’s National Cyber Security Centre (NCSC) has described two separate spear phishing campaigns launched by Russia’s SEABORGIUM threat …
Is alert fatigue getting to you? I found a guide that allows you some well-deserved personal downtime, and still has something to do with work…
I have read a lot of Sci-fi. Thousands of books actually. You can't help but start recognizing patterns. One of my favorite movies is Blade …
Completion percentages on compliance and security training campaigns have become a popular topic of discussion.
Yeah, quantum computers are likely to be able to crack passwords from every angle.
For the second time in less than a year, Mailchimp has found itself in a precarious situation, having to admit that it has been breached. It …
In our latest episode of Security Masterminds, we have the pleasure of interviewing Roger Grimes, Data-Driven Defense Evangelist for KnowBe4, …
Researchers at Safeguard Cyber describe a phishing campaign that’s posing as a Japanese rail ticket reservation company.
KnowBe4's latest reports on top-clicked phishing email subjects have been released for 2022 and Q4 2022. We analyze 'in the wild' attacks …
Researchers at Fortinet warn that a phishing campaign is impersonating the Chinese Ministry of Finance. The phishing emails contain a document…
Cybersecurity Ventures released a new report that showed cybercrime is going to cost the world $8 trillion USD in 2023.
New data shows that SMBs can clearly see where they have cybersecurity issues and are taking great strides to put their devoted budget to …
Malicious use of the text-based AI has already begun to be seen in the wild, and speculative ways attackers can use ChatGPT may spell …
An unusual phishing technique has surfaced this week. Avanan, a Check Point Software company, released a blog Thursday morning detailing a new…
Finally some good news from the ransomware front! Despite bad actors launching a number of ransomware campaigns throughout 2022, …
Africa’s largest law firmordered to pay R5.5 million to a woman who fell victim to a hacking syndicate. When Judith Hawarden was buying a …
Mandiant has published a report describing phishing emails that have breached organizations in the industrial sector. Mandiant explains that …
Researchers at Armorblox warn that a phishing campaign is impersonating DHL with fake shipping invoices.
Researchers at Group-IB are tracking a previously unknown threat actor dubbed “Dark Pink” that’s using spear phishing attacks to target …
In a new twist, threat actors use a typo squatted domain name to increase the chances that stolen data will be seen by the general public …
An analysis of the publicly-accessible data on ransomware attacks shows that these sectors that were a primary target of ransomware in 2021 …
In a move designed to protect the insurer and allow for more cyber policies to be issued, this bond is new to cyberinsurance, but not to …
Exciting news! We just released our full conference agenda for KB4-CON 2023, happening April 24-26 in Orlando, Florida. We’ve brought back …
Is your organization’s password complexity strong enough?
PhishER, KnowBe4’s industry-leading Security Orchestration, Automation and Response (SOAR) platform, takes an otherwise complicated and …
We’re thrilled to announce that the power of KnowBe4’s most popular free password security tool has been brought to your KnowBe4 console as a …
Techradar reported that cyberattacks saw a significant rise in 2022, mostly due to the increase in organizations going virtual to combat the …
I have been doing some research on Secure Email Gateways. The picture is not that pretty. Below I will summarize what I found.
Phishing attacks are now the top vector for ransomware delivery, according to researchers at Digital Defense. Phishing emails can be highly …
Government workers are prime targets for social engineering attacks, according to Kaitlyn Levinson at GCN. Attackers use different tactics to …
Some excellent work here. An internal US Government agency audit audit showed that a fifth of passwords were easy to crack. Their recently …
An Italian citizen named Filippo Bernardini has pleaded guilty in New York to stealing more than a thousand unpublished book manuscripts from …
The recent hack (at least 7th) of the LastPass password manager has lots of people wondering if they should use a password manager.
We strongly recommend that you use a password manager to reduce password reuse and improve complexity, but you may be wondering if it’s really…
Reuters describes a cyberespionage campaign carried out by the hitherto little-known threat group researchers track as "Cold River." The group…
A rise in the reliance on unmanaged mobile devices, matched with a lack of patching and increased attacks seeking solely to steal credentials …
Representing more than half of all cyber loss, new data shows these attacks all begin with employees falling for social engineering, phishing,…
Interest in the handheld open-source multi-function cybersecurity tool by techies has risen to a new campaign seeking to steal crypto funds …
The UK’s National Cyber Security Centre (NCSC) has outlined the top six most impersonated UK government agencies in 2022. The most …
ZDNet summarized the problem as follows: "Up to 1,981 schools, 290 hospitals, 105 local governments and 44 universities and colleges were hit …
Researchers at Check Point have shown that Large Language Models (LLMs) like OpenAI’s ChatGPT can be used to generate entire infection chains,…
The technique began in the Chinese underworld, and it amounts to an unusually protracted form of social engineering. The analogy is with …
Analysis of the year’s breaches shows Finance and Insurance businesses are the most targeted and have lost a material count of records as a …
Despite good intentions, layered security measures, and efficacy claims by security solution vendors, new data shows that email-based threats …
Check out the 36 new pieces of training content added in December, alongside the always fresh content update highlights and new features.
New data focused on cyberattacks in the second half of the year-to-date shows phishing taking the overwhelming lead as the initial attack …
By Roger A. Grimes. KnowBe4 recommends that everyone use a password manager to create and use strong passwords as a part of their password …
Dec. 27, 2022, The Ohio Supreme Court ruled in favor of an insurance company, determining that its contract to cover any direct physical loss …
Impersonating Facebook using its own platform against them, a new phishing attack takes advantage of victim’s inability to distinguish …
QBot malware phishing campaigns have adopted a new distribution method using SVG files to perform HTML smuggling that locally creates a …
The malicious abuse of several developer program accounts in Microsoft’s Windows Hardware Developer Program allowed threat actors to have …
New data shows that while ransomware remains somewhat flat, massive increases in business email compromise and response-based email attacks …
As an apparent method of political commentary on the war in Ukraine, the new Azov wiper uses a mix of intermittent overwriting and trojanizing…
Researchers at ESET warn that a Chinese-speaking threat actor dubbed “MirrorFace” targeted Japanese political organizations with spear …
A well-trained Knowster posted: "I lost my dog this weekend and my mother in law was trying to be helpful and put my real phone number on a …
We are excited to announce that KnowBe4 has been named a leader in the Winter 2023 G2 Grid Report for Security Orchestration, Automation, and …
We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) …
A recent Ivanti report shows cybersecurity practitioners getting more focused on the threat landscape, but defenders may need to hone their …
The festive season is my favorite time of the year. It is a time to celebrate and reconnect with our family, friends and community and the one…
Attackers are using XLL files to embed malicious code in Office documents, according to researchers at Cisco Talos. Microsoft is phasing out …
The Federal Bureau of Investigation (FBI), the Food and Drug Administration Office of Criminal Investigations (FDA OCI), and the US Department…
A small town in Manitoba, WestLake-Gladstone (population about 3300), fell victim to a social engineering campaign. The municipal government …
This brand new ransomware gang is on the attack and, despite them being new to the game, are coming out of the gate attacking the healthcare …
Demonstrating a complete lack of focus on the need for additional authentication factors, surprising new data highlights a material security …
Tricking five state Medicaid programs, two Medicare Administrative Contractors, and two private health insurers, the scammers posed as …
Abnormal Security’s CISO, Mike Britton consolidates some of the best advice from a three-part webinar series on the current state of risk …
New analysis of dark web forums shows an increase in discussions around the use of infostealer malware as part of both the first attack within…
Trending data going back to January of 2020 shows that ransomware attacks are continually increasing in number with unusual highs in the 4th …
An SMS phishing (smishing) campaign is impersonating utility providers in the US, Cybernews reports. Researchers at Enea AdaptiveMobile …
You know how some gifts are insanely sought after each year, selling out in mere minutes? Well, these are great tools for scammers, especially…
Investigative reported Brian Krebs reported December 13, 2022 that "InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI)…
On December 8th, the Cybersecurity & Infrastructure Security Agency (CISA) released a great phishing infographic about data collected, …
A U.S.-based enterprise manufacturing organization cut their Phish-prone Percentage™ (PPP) by more than 80% after five months using the …
ChatGPT could give Google a serious run for its money. We are not quite there yet, but the capabilities are rapidly improving. Just have a …
Analysis of attacks on two cellular carriers have resulted in the identification of threat actions designed to undo mitigations taken by …
We’ve long known developers of cyberattacks to be crafty and focus a lot of energy on obfuscation, but a new attack can shift gears midstream,…
A sophisticated scammer group has stolen at least €480 million from victims in France, Belgium, and Luxembourg since 2018, according to …
Cisco's annual Security Outcomes Report shows executive support for a security culture is growing. The report identifies the top seven success…
Recent attacks are helping cyber insurers better understand what security strategies need to be in place and how to price policies based on …
Taking the lead over the use of Word, Excel, PDF, and other office-type documents in attacks, new data shows that files like ZIP and RAR have …
Ransomware strikes organizations almost every two seconds. Tales of bad actors doing their worst fill the InfoSec news cycle, but what happens…
A Russia-linked threat actor tracked as TAG-53 is running phishing campaigns impersonating various defense, aerospace, and logistic companies,…
It's three weeks before Christmas, and the latest video game console is getting harder and harder to find in stores. You've checked all the …
CyberheistNews Vol 12 #49 | December 6th, 2022 [Keep An Eye Out] Beware of New Holiday Gift Card Scams By Roger A. Grimes Every …
A phishing campaign is impersonating Apple and informing the user that their Apple account has been suspended due to an invalid payment …
Maggie Miller at Politico had the scoop: "TALLINN, Estonia — Some 150 NATO cybersecurity experts assembled in an unimposing beige building in …
Delivering an equally new Royal ransomware, this threat group monitored by Microsoft Security Threat Intelligence has already shown signs of …
Using a mix of invisible and lookalike characters, this phishing attack attempts to get past security scanners by obfuscating both email …
New analysis of spam and malicious emails show the all but nonexistence of COVID-esque impersonation of government and pharm entities in lieu …
With 97% of U.S. organizations experiencing a ransomware attack over a weekend or on a holiday, the impacts on response and recovery time are …
Check out the 55 new pieces of training content added in November, alongside the always fresh content update highlights and new features.
Law enforcement authorities across Europe, Australia, the United States, Ukraine, and Canada have taken down a popular website used by …
Every holiday season brings on an increase in gift card scams. Most people love to buy and use gift cards. They are convenient, easy to buy, …
The phenomenon known as “quiet quitting,” in which employees become disengaged from their work while formally remaining in their jobs, can …
Merriam-Webster has announced "gaslighting" as the 2022 word of the year. One definition of gaslighting is "to manipulate (someone) into …
We’re excited to introduce a new way for your users to engage with KnowBe4 security awareness and compliance training anytime and anywhere …
It’s easy to think of the typical online holiday scam as something that affects mostly individuals. Sad, maybe, and unfortunate, but not …
Craig Hale at Techradar reported: "A post on a “well-known hacking community forum” claims almost half a billion WhatsApp records have been …
Here is a 3-minute article that we suggest you copy/paste and send to all your users as part of your ongoing security culture campaign. "The …
This statistic is alarming and underscores the importance of having a robust cybersecurity program in place. According to the Ponemon …
Microsoft has observed a threat actor that’s been running a phishing campaign since August 2022. The threat actor, which Microsoft tracks as …
Long gone are the days of tacky landing pages that barely impersonate a brand; threat actors are improving their social engineering game well …
Using the simplest tactic of not including a single piece of content that can be considered malicious, these types of scams are making their …
Researchers at Trellix revealed that phishing email attacks targeting users in the Middle East doubled in October 2022 ahead of the World Cup …
Researchers at Specops Software describe a technique attackers are using to bypass multi-factor authentication (MFA). In an article for …
New data focused on emails sent through Microsoft 365 highlights the methods used to ensure a successful attack beginning with a malicious …
The aftermath of a ransomware attack last month demonstrates just how bad an attack can get when the cybercriminals don’t get what they want.
In years gone by, Black Friday was a 24-hour rush to the shops (you remember those places with actual people and merchandise that you could …
Akamai researchers have discovered a new phishing campaign that targets United States consumers with fake holiday offers, TechRadar reports. …
Despite the somewhat logical notion that once you’ve paid the ransom, the attack is over, new data shows that paying the ransom doesn’t help …
New data polled from analysts and members of the retail industry about their security focus is this holiday season reveals the kinds of …
You’ve heard that vendor dependencies are ripe for malicious abuse and you have read the stories where vendors were used to exploit and …
Leveraging a legitimate feature of Dynamics 365, threat actors are able to obfuscate the malicious nature of the email within content that …
As ransomware, business email compromise, and phishing attacks continue to escalate, new data sheds light on where organizations need to focus…
A new report from the UK’s National Cyber Security Center highlights the current state of threats in the UK, with particular focus on …
The latest data shows that historically massive rate increases seen over the last few years are beginning to come down, primarily due to …
As we enter the holiday season, we start getting bombarded with amazing offers and often take advantage of not only grabbing ourselves a …
Researchers at Vade Secure describe a type of phishing attack dubbed “clone phishing,” in which attackers follow up a legitimate email from a …
Suzanne Smalley at Cyberscoop reported: "FBI Director Christopher Wray told Congress on Tuesday he is “extremely concerned” that Beijing could…
Major cryptocurrency company FTX recently filed for bankruptcy, and there's a big phishing campaign on the loose targeting FTX users.
Researchers at Cyjax describe a large phishing campaign being run by a China-based financially motivated threat actor called “Fangxiao.” The …
It's the best time of the year! But also, it's the busiest time for cybercriminals. Since your users will be distracted with seasonal …
Sometimes a social engineering campaign has a clear geographical focus, often shaped by language, holidays, or current events. In this case, …
How many business emails do the recipients actually want? Or, conversely, how many of them are unwanted? A study by Hornetsecurity looked at …
In the latest FBI warning, cybercriminals are now impersonating financial institutions' refund payment portals. This effort is to contain …
Researchers at Avanan warn that a phishing campaign is using Microsoft’s Dynamic 365 Customer Voice feature to send malicious links. Customer …
Even with employees seeing cyberattacks first-hand and understanding the seriousness of such attacks, organizations have a culture problem …
While every sector is taking strides to improve their security stances against ransomware and other cyberattacks, the latest data shows that …
Check Point Research provides highlights that color the third quarter of 2022, painting a picture of increases in attack frequency and …
Phishing via Short Message Service (SMS) texts, what is known as smishing, is becoming increasingly common (some examples are shown below). …
The Robin Banks phishing-as-a-service platform now has a feature to bypass multi-factor authentication by stealing login session cookies, …
This Data wiper replaces every other 666 bytes of data with junk. Techradar reported that a new data-wiping malware has been detected, …
Hospital emergency rooms around the world are fine-tuned to meet the requirements of the “Golden Hour”. The Golden Hour is a well-accepted …
A criminal gang is launching business email compromise (BEC) attacks by posing as “real attorneys, law firms, and debt recovery services.” The…
Australia is the new hot spot for cyber attacks. The Australian Cyber Security Centre (ACSC) recently reported that Australia has been …
We are thrilled to announce a brand-new product designed to help you develop a strong security culture. SecurityCoach enables real-time …
Steven Lee Myers at the NYT had the scoop on this typical Russian influence operation which really is social engineering at scale: "The user …
As scammers shift their campaigns and learn from their successes, new data shows that the global delivery service is the current brand of …
With compromised LinkedIn credentials providing cybercriminals with ample means to socially engineer business contacts, this campaign is a …
When push-based multifactor authentication (MFA) first came out, I was a big fan. I promoted it as a strong and safe MFA option in my book, …
A study by researchers at Lookout has found that credential-harvesting phishing attacks against US government employees rose by 30% last year.…
Scammers are taking advantage of the victims desire to take advantage of debt cancellation up to $20,000 – with the only one cashing in being …
This latest “new kid on the block” is gaining momentum and – according to CheckPoint – seeing successes with their attacks globally, calling …
This new group makes the case that – as with any market – cybercriminals will focus on a niche sector they are experts on in order to improve …
KnowBe4 is proud to be recognized by TrustRadius in the first-ever “Best Software” Awards for overall, mid-size, and enterprise in the …
When you think of using biometric technology as part of your multi-factor authentication process, you assume these attributes are safe. …
Human societies have a bad habit of taking a specific, limited-in-scope fact and turning it into an overly broad generalization that gets …
Michael Kan at PCMag had the scoop: A hacker is already circulating one phishing email, warning users they'll need to submit some personal …
Let’s begin by looking at what culture is and why it matters. Culture is tacit and elusive in its very nature. It is often unspoken, based on…
Australia has now become the newest target for attacks in part due to a overworked cybersecurity workforce that are not able to stop these bad…
Our friend R. Friederich at Marshalsec sent us this warning...
Researchers at Armorblox have observed a phishing campaign impersonating LinkedIn. The emails inform the user that their LinkedIn account has …
Security Magazine wrote this week about the recent eye opening SlashNext State of Phishing report. "SlashNext analyzed billions of link-based…
With only 57 vulnerabilities tied to ransomware back in 2019, the most recent data from security vendor Ivanti shows that number predicted to …
Since 2018, remote desktop compromise (RDP) and phishing have battled for dominance as the primary initial attack vector in ransomware …
A newly released report on ransomware preparedness shows organizations are improving their security stance in comparison to last year, but …
Check out the 29 new pieces of training content added in September, alongside the always fresh content update highlights and new features.
Researchers at Cyren describe a phishing attack that resulted from the theft of a stolen iPad. The iPad was stolen on a train in Switzerland, …
The Department of Homeland Security (DHS) is providing $185 million of grant money this year to U.S. states and territories to bolster their …
KnowBe4's latest quarterly report on top-clicked phishing email subjects is here. We analyze 'in the wild' attacks reported via our Phish …
There is a good chance that you and nearly everyone else will be using passkeys in the near future.
Deepfakes, the realistic and thoroughly convincing fabrication of imagery, video, and audio that fakes the identity of some person in ways …
We received an interesting email from Elevate Security you need to be aware of. Their recent research showed: "Social engineering attacks are …
Britain's data watchdog has fined major construction group Interserve with a £4.4m fine. This was due to a cyber attack stole personal and …
University student accounts are being exploited for business email compromise. Researchers at Avanan have observed a rise in attacks that …
The king of callback phishing campaigns has evolved their methods to include better phishing emails, phone call scams, and final payloads to …
In an interesting twist, this latest scam identified by security researchers at Avanan attempts to establish legitimacy by making the victim …
Compliance training is often seen as a chore that organizations need to just get through. That said, compliance cannot simply be ignored. A …
A phishing campaign is impersonating the US Social Security Administration (SSA) in an attempt to steal Social Security numbers, according to …
Researchers at Trellix warn of phishing attacks targeting election workers in advance of the US midterm elections. These attacks spiked ahead …
The Metaverse, while still a concept at the moment, consists of the possibilities that arise when you combine the advances and affordability …
This new credential harvesting scam impersonates a real U.S. Government COVID-related grant program to harvest credentials and personal …
With ransomware attacks becoming more frequent, evasion getting more sophisticated, and ransoms increasing, new data shows organizations …
The South Africa Post Office (SAPO) recently warned customers of phishing emails to portray the post office. These cybercriminals are asking …
Steven Rosenbush at the WSJ reported: "Chief information officers say cybersecurity once again will be their top investment priority in 2023, …
Scammers are sending Discord messages with phony accusations to trick users into clicking on phishing links, according to Shan Abdul at …
I am reading and hearing about a ton of job scams these days. So many, I wondered how anyone could get a real job or employee, especially in …
Conventional ransomware encrypts the victims’ files and holds them hostage, unavailable to their owners, promising to provide a decryptor once…
Cyberattacks are the biggest risk to the UK financial system, according to new research from the Bank of England.
Under the guise of determining applicant eligibility for a U.S. federal government job, this latest phishing attack plants the seed for a …
With ransomware gangs making so much money and then dropping off the face of the earth, what’s the motivation to come back to life and …
The recent arrest demonstrates how very small and unsophisticated a cybercriminal team can be to launch a very successful phishing campaign …
INKY has published a report on the use of small business grants as phishing lures. Scammers are impersonating the US Small Business …
Scammers have been around as long as history has been recorded. Think about the famous ‘Trojan Horse’ for example. A perfect scam that allowed…
Researchers at Mandiant have published an analysis of a phishing-as-a-service kit called “Caffeine,” which further lowers the bar for …
Security researchers at Akamai identify an average of 13 million newly observed domains (NOD) each month this year, representing about 20% of …
New insight from the SANS Institute surveying 300 ethical hackers sheds some light on how they perceive your security stance – and how easy it…
New analysis of cyberattacks shows that organizations aren’t able to properly detect ransomware attacks, resulting in a majority of victims …
Occasionally you will hear people or organizations claiming that they are on the verge of eliminating all social engineering from reaching …
Check Point Software is one of the world's best-known and largest infosec companies. In September 2021 they acquired email security company …
Greg Noone at the Techmonitor site covered this problem early October 2022, starting with a horror story.
For the third consecutive year, we received a Tech Cares Award from TrustRadius! This third annual award celebrates companies that have gone …
A man from Atlanta, Georgia has been convicted of running romance scams and business email compromise attacks that netted him over $9.5 …
Here are some do’s and don'ts for your phishing simulation exercises.
The US Internal Revenue Service (IRS) has issued an alert warning of a significant rise in text message phishing scams (smishing) …
The US Federal Communications Commission (FCC) offers advice on how to avoid falling for scams that follow in the wake of natural disasters …
We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) …
We are excited to announce that KnowBe4 has been named a leader in the Fall 2022 G2 Grid Report for Security Orchestration, Automation, and …
New insight from over 1200 businesses paints a picture of how organizations believe they are ready for an attack and are definitely focused on…
New analysis highlights just how prevalent ransomware attacks are today, how material the impacts are, whether organizations get their data …
Scammers continue to get creative when it comes to current events - and this new scam is no exception.
The Bundeskriminalamt (BKA), Germany's federal criminal police, raided three homes on Thursday, September 29th, in the course of an …
Researchers at Trend Micro warn that the social engineering potential of deepfakes is becoming an increasing concern. Deepfakes have already …
Jai Vijayan, Contributing Writer at Dark Reading correctly stated: "It's time to dispel notions of deepfakes as an emergent threat. All the …
Setting a record for both highest count and share in volume with other types of phishing scams, response-based attacks are at their highest …
Check out the 35 new pieces of training content added in September, alongside the always fresh content update highlights and new features.
Researchers at SentinelOne have warned that North Korea’s Lazarus Group is using phony Crypto.com job offers to distribute macOS malware. The …
What really makes a “strong” password? And why are you and your end-users continually tortured by them? How do hackers crack your passwords …
American Airlines has disclosed that an attacker used phishing attacks to breach the company’s systems, BleepingComputer reports.
Imagine you're on a conference call with your colleagues. Discussing the latest Sales numbers. Information that your competitors would love to…
New data sheds a shocking light on just how inexperienced organizations are today in addressing cybersecurity needs – and the impact attacks …
Despite the pandemic being largely considered over, a recent Private Industry Notification focused on the Healthcare industry indicates that …
A phishing campaign is impersonating UK energy regulator Ofgem, according to Action Fraud, the UK’s cybercrime reporting centre.
When it's time to complete a compliance audit of your cybersecurity readiness plan, are you thinking, "Ugh, is it that time again?"
Optus, one of Australia's largest telecommunications companies, recently suffered a data breach that affected over 9.8 million customers.
A convict serving twenty-five years in South Carolina for voluntary manslaughter and attempted armed robbery, Darnell Kahn, has now also been …
According to nearly every study conducted over the last decade, social engineering is involved in the vast majority of cyber attacks. The …
With Retail seeing and feeling the impact of more ransomware attacks than nearly every other industry, a new report focuses in on what the …
Luring victims using a realistic- and legitimate-looking fake browser window to steal Steam accounts, this new type of social engineering may …
GitHub has issued an alert warning of a phishing campaign targeting users by impersonating the popular DevOps tool CircleCI, BleepingComputer …
We’re thrilled to announce that Atlassian Jira integration support is now available with KnowBe4’s KCM GRC platform.
A survey by GetApp has found that the number of organizations using phishing simulations has risen from 30% in 2019 to 70% in 2022. Despite …
New quarterly data from the Anti-Phishing Working Group shows unprecedented phishing activity with increases in BEC, use of social media, …
Everyone should use multifactor authentication (MFA), where they can, to protect valuable information. Everyone!
The US Federal Bureau of Investigation (FBI) has issued an alert warning of an increase in phishing and other social engineering attacks …
Bank of America recently sent a customer service email warning users to watch out for this new phishing attack.
iIt was all over the news, but ZDNet's Eileen Yu was one of the first. -- "Hacker is believed to have breached Uber's entire network in a …
Attackers are exploiting a legitimate French government website to send phishing messages, according to researchers at Vade. The website, Pôle…
You wanted the ability to manage both phishing and training campaigns across multiple KnowBe4 accounts, and we listened!
Security researchers at Cisco Talos have issued an update on the cyberattack Cisco sustained earlier this year. The attack began with a …
October is Cybersecurity Awareness Month, and you are undoubtedly being bombarded with some fantastic advice on how to stay cyber safe.
The Sun just reported that experts are sending a warning about online scams in relation to Queen Elizabeth's passing.
Dutch authorities have announced that an imprisoned scammer was running a phishing operation from his jail cell, Cybernews reports. The crook …
As ransomware gangs look for new ways to improve their execution, this relatively new encryption tactic has been gaining popularity in …
You might think 100% completion rates on any employee training sounds too good to be true. But, getting compliance on your compliance training…
Threat actors are taking advantage of every free tool and service they can to improve their changes of successfully fooling security …
Researchers at Kaspersky have found that the vast majority of gaming-related malware lures are targeted at Minecraft players. Roblox came in …
New data from PwC provides insight into what aspects of the business are executives focused on, worried about, and seeing as future challenges…
Queries of reported cases to Singapore Police reveal a rise in scam costs by 59% as phishing cases double and job-related scams increase 7x …
Phishing is still the No. 1 attack vector. Your users are exposed to malicious email daily. They can now report those to your Incident …
We’re thrilled to announce a brand new microlearning, TV-like production quality series of compliance content now available in the Compliance …
Researchers at Resecurity have discovered a new Phishing-as-a-Service (PhaaS) platform called “EvilProxy” that’s being offered on the dark …
Everyone knows you shouldn’t click phishy links. But are your end users prepared to quickly identify the trickiest tactics bad actors use …
Researchers at Check Point have discovered a spear phishing campaign dubbed “DangerousSavanna” that's targeting financial entities in at least…
1-Time Passcodes Are a Corporate Liability. Department of Homeland Security Fraud Warning. Email not …
Anyone who has run security awareness programs for a while knows that changing human behaviour is not an easy task. And that sometimes the …
Once again we are hosting a special KB4-CON Virtual Summit for all of our customers and partners in Europe, the Middle East, and Africa with …
The previously-thought defunct cybercriminal gang appears to not only reopened for business but has re-established themselves as a major …
The number of reported cases of phishing to Japan’s Council of Anti-Phishing reached over 100,000 in July, just as a notice of scams …
Researchers at Vade warn that an email phishing campaign is informing users that their Instagram account is eligible to receive a blue …
The Department of Homeland Security’s Office of the Inspector General (DHS OIG) has issued an alert to warn that scammers are posing as DHS …
Check out the 50 new pieces of training content added in August, alongside the always fresh content update highlights and new features.
We’ve written a lot about multi-factor authentication (MFA) not being the Holy Grail to prevent phishing attacks, including here:
Researchers at Check Point warn that attackers based in Turkey are distributing cryptomining malware via free software distribution websites, …
As threat actors look for ways to evade detection by security solutions, the use of cloud applications has seen a material jump in the last 12…
As cybercriminals continue to evolve their techniques, they continue to rely on phishing as the most successful tried and true method of …
After suffering a taste of their own medicine as part of a response effort from victim organization Entrust, LockBit appears to have bounced …
[The following article is at it appears at Krebs on Security here.] Phishers are enjoying remarkable success using text messages to steal …
Researchers at NordVPN have published the results of a survey that found that 84% of Americans have experienced some form of social …
ARN just reported: "The metaverse is seen by many companies as a great business opportunity and for new ways of working. Security provider …
Despite the crypto market’s loss of over $1 trillion in value since the beginning of the year, the value of the digital currency isn’t what …
First debuted in July 2021, this ransomware gang that engages in their own attacks and offers a RWaaS model, has come back into the limelight …
Companies heavily reliant on operational technology (OT) to function are just as much a target as businesses relying in traditional IT and are…
Scammers created a deepfake video of Patrick Hillmann, Chief Communications Officer at cryptocurrency exchange Binance, in order to scam …
If you've been approached by recruiters on LinkedIn for a potential job opportunity, you may want to pay attention to this recent scam.
As cyber insurers evolve their understanding of the cyber attack landscape, who’s responsible, and what’s at stake, a logical next step is …
There are, famously, three things you can do with risk: accept it, mitigate it, or transfer it. And you transfer risk by buying insurance …
As the CEO of a public InfoSec company I have a variety of news sources. One of these is called '"The Information" which covers in-depth tech …
We know everyone is busy. Everyone already has too much on their plate and is trying to learn as much as they can every day.
Most of us are all too familiar with vishing, the scam voice calls that offer to erase your credit card debt, to extend your automobile …
In a variation on a recently seen theme in which scammers pose as buyers on e-commerce platforms, victims in Singapore are being taken in by …
Cybersecurity Awareness Month is right around the corner, and we’ve got you covered! Your complimentary resource kit for 2022 is now available.
A recent report from FortiGuard Labs saw ransomware variants double in total so far compared to 2021, and the year is not over yet.
Tailgating or piggybacking is an old but effective social engineering technique to gain physical access to restricted areas, according to …
New data shows attempted ransomware attacks are occurring far more frequently while a lack of confidence is found in security measures and …
New data shows an upswell of email-based cyberattacks, with over 256 brands being impersonated, as social media, Microsoft, shipping, and …
Reaching a six-quarter high in Q2, hybrid vishing attacks have increased six times that of the hybrid-vishing attacks experienced in Q1 2021.
Plenty of new anecdotal and legal case-based stories are demonstrating that just because your organization has a policy doesn’t mean it’s …
Microsoft has disrupted operations carried out by a Russian government-aligned threat actor tracked as “SEABORGIUM.” The threat actor uses …
Hardly a day goes by without a news alert about the latest HUGE data breach. It’s so commonplace today that it rarely rates showing at the top…
Researchers at AdvIntel warn that three more ransomware groups have begun using the BazarCall spear phishing technique invented by the Ryuk …
Cisco has disclosed a security incident that occurred as a result of sophisticated voice phishing attacks that targeted employees, according …
Cyberattacks via SMS messaging are on the rise, and are having such an impact, the Federal Communications Commission has released an advisory …
Using a mix of compromised social media accounts, social engineering, call center agents, and some convincing websites, this latest scam seeks…
Initial Access Brokers (IABs) are one of the new breeds of cybercrime services. But this newest PhaaS platform makes it easy for anyone to …
New data shows that not only are email-borne threats increasing, but that current integrated cloud email security solutions do little to …
Newer phishing scams are looking for ways to make legitimate websites do the work of delivering malicious messages to unsuspecting victims – …
Researchers at Trend Micro warn that a SolidBit ransomware variant is being distributed via fraudulent software targeting video game players …
In a recent article by Forbes, Cisco confirmed that they were hacked by a ransomware group as the group of cybercriminals published a partial …
This article is a good technical overview of DNS that can help you prevent spoofing. This is a cross-post from the EasyDMARC blog, a new …
North Korea’s Lazarus Group is running a new phishing campaign targeting Coinbase accounts, BleepingComputer reports. The threat actors are …
If you're a Coinbase user, you are most likely the next target of a new phishing campaign. Cybercriminals have managed to infiltrate …
Cybercriminals are out there, watching and waiting for the perfect opportunity. They are gathering information about your organization and …
TradeArabia has published a report about common scams on CashApp, explaining that scammers frequently take advantage of CashApp promotions, …
According to the CS Hub Mid-Year Market Report 2022, new findings shows that 75% of survey respondents believe that social engineering and …
Communications giant Twilio has confirmed hackers accessed customer data after successfully tricking employees into handing over their …
The WSJ reported Aug 8, 2020: It is becoming more expensive and difficult for companies to get or renew cyber insurance. The price of U.S. …
The summer is winding up, and the traditional academic year is approaching. And amid the welcomes from the deans of students, the activities …
As cybercriminals look for novel and effective ways to gain entrance to a victim network, LinkedIn is proving to be fruitful enough to keep …
New data based on tracked, publicly-confirmed ransomware attacks shows that downtime – and the associated cost – is increasing at an alarming …
Attackers are exploiting open redirects to distribute links to credential-harvesting sites, according to Roger Kay at INKY. The attackers are …
KnowBe4 is proud to be recognized by TrustRadius with the Summer Best of Awards in three categories for the Security Awareness Training …
As a security leader, you have a lot on your plate. Even as you increase your budget for sophisticated security software, your exposure to …
We’re accustomed to social engineering being used for credential theft and business email compromise. We’re also accustomed to hearing about …
The cybercriminal gang, dubbed ‘Luna Moth’ uses a sophisticated mix of phishing, vishing, remote support sessions, and remote access trojans …
The 2022 KnowBe4 Women’s Day Survey interviewed more than 200 women from across the technology industry in South Africa to find out more about…
New data about the state of cyber insurance shows that given the current loss ratios by insurers – and the reasons behind those losses – will …
After a few notifications of a potential problem with Experian by his readership, Brian Krebs and team checked out Experian’s account signup …
A complex and ambitious investment scam has used more than 10,000 domains to induce speculators to give up not just funds, but personal …
It's been 23 years of celebrating all of our fellow System Administrators! Your hard work on daily maintenance of your company's day-to-day …
Check out the thirteen new pieces of training content added in July, alongside the always fresh content update highlights and new features.
Fresh data on data breach costs from IBM show phishing, business email compromise, and stolen credentials are the longest data breaches to …
Malicious USB keys have always been a problem. There is almost no professional penetration testing team that does not drop a handful of USB …
Researchers at WithSecure have discovered a spear phishing campaign targeting employees who have access to Facebook Business accounts. The …
New research from IBM shows four reasons why phishing attacks are still effective and remains the primary attack vector in 41% of cyberattacks.
Using a simple email containing a voice mail attachment, an ingenious phishing attack captures credentials while keeping track of the domains …
A new attack uses one brand email domain to increase the chances of reaching an Inbox, while spoofing another brand to trick users into …
KnowBe4's latest quarterly report on top-clicked phishing email subjects is here. We analyze 'in the wild' attacks reported via our Phish …
Forty-seven percent of organizations have experienced voice phishing (vishing) attacks over the past year, according to researchers at Mutare.…
Do you know your organizations true security risk and where to prioritize your resources? A new report from Palo Alto Networks sheds some …
We all know that big brands can be exploited by bad actors in order to execute successful phishing attacks. Now a new study is showing …
Researchers at Malwarebytes warn that a large malvertising campaign is exploiting Google ads to redirect users to phishing sites.
Just when you thought scammers couldn't get more tricky in their attacks, this example will prove you wrong.
The Colonial Pipeline ransomware attack of 2021 put infrastructure operators on notice that they were directly in the crosshairs of big …
At the last few conferences I have attended and spoken at, including our own KB4-CON 2022, I noticed a question that many people have …
Investigative reporter Brian Krebs reported today that U.S. state and federal investigators are being inundated with reports from people …
With record low unemployment, a tight labor market, and increasing customer demand, everyone says it is an employee’s job market out there. …
Cryptocurrency investors have lost nearly $43 million to fraudulent cryptocurrency investment apps, according to the US Federal Bureau of …
With so many Boards focused on operations, revenue, strategy, and execution, they completely are forgetting the simple fact that a single …
While multi-factor authentication (MFA) significantly reduces an organization’s threat surface by making the stealing of credentials much …
The latest iteration in Copyright Claim scams is an evolution of this repeated attack method that has proven to get the attention – and …
Researchers at Akamai have discovered a PayPal phishing kit that attempts to steal victims’ identities as well as their financial information.…
In less than 2 years, the most successful ransomware group to date has reached new levels of campaign and individual attack effectiveness, …
Cybercriminals almost always need to leverage credentials as part of just about any kind of cyberattack. To no surprise, phishing and social …
A creative mix of phishing emails, solid social engineering, use of Facebook Messenger, brand and site impersonation, and a sense of urgency …
Microsoft Security recently released a report which detailed a widely successful phishing attack technique used against over 10,000 of its …
You may want to be careful about clicking on a student loan forgiveness ad. The Tech Transparency Project reviewed the top Google searches …
Scammers are continuing to abuse the QuickBooks tax accounting software to send phishing scams, according to Roger Kay at INKY.
The average person believes using Multi-Factor Authentication (MFA) makes them significantly less likely to be hacked. That is simply not …
Scammers stole $8 million worth of Ethereum from users of the Uniswap cryptocurrency exchange, according to Sujith Somraaj at Decrypt. …
Once again, the human layer continues to be the most desirable attack vector for cybercriminals. 2022 marks the 5th year KnowBe4 has analyzed …
A new wave of social media phishing attacks are now using scare tactics to lure victims into sending their logins.
CrowdStrike sent the following Tech Alert to their customers
New data from IBM shows how attackers are leveraging more than just email to elevate their chances of reaching their malicious goals – and …
A recent phishing scam impersonating the Heineken beer brand demonstrates how very little effort is needed by scammers to convince victims to …
Check Point Research (CPR) observed a 37% increase in Amazon-themed phishing attacks during the first week of July, ahead of Amazon Prime day …
We are excited to announce that KnowBe4 has been named a leader in the Summer 2022 G2 Grid Report for Security Orchestration, Automation, and …
We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) …
As Amazon Prime Day approaches, Checkpoint research is sending a warning that Amazon Prime Day scams will ramp up very soon.
This week Marriott International, one of the largest hotel chains, suffered a second data breach of 2022. The breach took place in early June …
A “Fake Job” scam allows cybercriminals to gain entrance to the network at Sky Mavis, makers of the game Axie Infinity, and eventually take …
Check out the 68 new pieces of training content added in June, alongside the always fresh content update highlights and new features.
Cybersecurity Culture is a hot topic amongst many organisations and security professionals. But what are organisations doing to build a strong…
Bloomberg recently reported that FBI Director Christopher Wray issued a warning to Western companies that China wants to 'ransack' their IP. …
Researchers at CloudSEK have observed a financially motivated phishing campaign that’s impersonating the United Arab Emirates (UAE) Ministry …
The lure of last-minute deals to get away after staying home for the last 2 years is so strong, scammers are using it to their advantage with …
This is a great example of how even the simplest of social engineering tactics can be used as the first step in a likely-larger scam. In a …
Vade Secure warns that a phishing campaign is targeting TrustWallet cryptocurrency wallet users with phony verification emails.
In an interesting extortion twist to get ransomware victims to pay up, one gang has created a search site to allow employees to see if their …
The latest data on ransomware trends from backup vendor Veeam demonstrate the impact these attacks have on backups and an organization’s …
Newly released data from TrendMicro about high-risk email threats in 2021 shows where cybercriminals are placing their focus and where yours …
July is Ransomware Awareness Month, and we’ve got you covered with free resources!
A phishing campaign is impersonating the Canada Revenue Agency (CRA) in an attempt to steal Canadians’ personal information, according to Rene…
As of May 2022, MedusaLocker has been observed predominantly exploiting vulnerable Remote Desktop Protocol (RDP) configurations to access …
Bloomberg News recently reported that fake celebrity-endorsed crypto scams have doubled in the UK this year, and on average scammed victims …
A new article in Bloomberg focused on new sky-high online fraud numbers, they are horrendous. Here is a short summary and I recommend you read…
Shakespeare said it first, and things haven’t changed: suffering and desire continue to drive victims to the social engineers. Researchers at …
New insight into what happens during and after a ransomware attack paints a rather dismal picture of what to expect from attackers, your …
With nearly every organization experiencing some form of phishing attack, new data suggests these attacks are improving in sophistication, …
Scary new details emerge of cybercriminals using reverse tunneling and URL shorteners to evade detection by security solutions, allowing them …
An interesting way to bypass multi-factor authentication (MFA) was recently announced by Bleeping Computer. This particular attack method …
If you're looking for your company's next remote IT position, you may want to think twice before doing so. The FBI recently reported to the …
When it's time to complete a compliance audit of your cybersecurity readiness plan, are you thinking, "Ugh, is it that time again?"
A phishing campaign attempting to steal credentials for MetaMask cryptocurrency wallets, according to Lauryn Cash at Armorblox.
Amazon Prime Days this year are July 12 - 13th 2022. As a result, cybercriminals are taking every step to capitalize on the holiday with new …
Technology is everywhere in society these days from our communication, shopping, and commerce capabilities. Whether email, online purchases, …
Rather than run a complex credential harvesting phishing scam, attackers use existing information about their victim and hijack a popular web …
Lawsuits over denied cyber insurance claims provide insight into what you should and shouldn’t expect from your policy – and that actions by …
The free and unmonitored webpage publishing platform has been identified as being used in phishing scams dating back as early as mid-2019, as …
Researchers at Abnormal Security have observed an increase in vendor impersonation in business email compromise (BEC) attacks.
The Wall Street Journal just reported that Russian intelligence agencies have increased the pace of cyberattacks against nations that have …
Researchers at Zscaler warn that a spear phishing campaign is targeting the US military and other sectors with phishing emails that purport to…
The US FBI has warned that scammers on LinkedIn are a “significant threat,” CNBC reports. Sean Ragan, the FBI’s special agent in charge of the…
Information Security is mission-critical today.The global risk situation is higher than ever.Your employees are still your largest attack …
New data shows a rise in the use of text messages as an effective vehicle to connect with potential victims for social engineering scams as …
Security researchers have discovered a cunning PDF-based phishing attack that leverages social engineering and PDF prompt specifics to trick …
Thousands of members of cybercriminal groups were arrested in a sting that lasted 2 months and involved coordinated efforts of the law …
Cybercriminals are continuing to bypass the use of malware in favor of response-based and credential-centric social engineering attacks, …
The availability of such a massive number of records at no cost to any cybercriminal interested is a recipe for countless phishing campaigns …
Rather than go for the phishing jugular and point the victim immediately to a webpage to steal credentials or personal details, a new phishing…
New testimony to U.S. Senate Armed Services Committee Subcommittee on Cybersecurity by Microsoft’s Chief Scientific Officer sheds light on …
With exactly half of cybersecurity incidents caused by organizations having an outdated security posture, the ability to stop breaches …
IFSEC Global recently acknowledged our very own Anna Collard as a IFSEC Global Influencer in Security for 2022! She was one of the few …
Threat actors are targeting HR employees who are looking to hire new people, according to Lisa Vaas at Contrast Security. As part of their …
An Iranian threat actor is conducting a spear phishing operation against Israeli officials, according to researchers at Check Point. The …
Attackers are taking advantage of the current news about monkeypox to trick people into clicking on malicious links, Pickr reports. …
Researchers at PIXM have uncovered a major Facebook Messenger phishing scam that’s “potentially impacted hundreds of millions of Facebook …
Researchers at KELA warn that ransomware gangs are increasingly refraining from mentioning their victims’ names after the initial attack, …
In KnowBe4’s new Password Policy ebook, What Your Password Policy Should Be, we recommend that all users use a password manager to create and …
The US Cybersecurity and Infrastructure Security Agency (CISA) and its partners have issued a joint alert on Karakurt, a data theft extortion …
Reaching more than 1 million attacks in a single quarter for the first time, new data on phishing attacks in Q1 of 2022 show an emphasis on …
A new survey of executives sheds light on how well organizations fared with cyberattacks in the last 12 month as well as what attack vectors …
A new phishing method uses a decades-old special URL format to take advantage of how security solutions and email clients interpret URLs, …
The world’s five leading cybersecurity authorities have again issued a joint report about an increase in malicious cyber activity targeting …
New data from security vendor Sophos shows that while the presence of cyber insurance coverage has increased, it’s the experiencing of attacks…
The US Federal Trade Commission (FTC) has warned that people have reported losing over $1 billion in crypto to scams since the beginning of …
What is a security tech stack? This is a bare-bones quick overview.
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human …
Bitdefender warns that Microsoft Office applications are vulnerable to phishing tactics that exploit international domain names (IDNs). …
A growing number of organizations worldwide are utilizing cryptocurrency for a host of investment, operational, and transactional purposes. …
KnowBe4 just released its official guidance and recommendations regarding password policy. It has been a project in the works for many months …
KnowBe4 just released its first e-book covering password attacks, defenses and what your password policy should be. Here is a summary of its …
Check out the 26 new pieces of training content added in April, alongside the always fresh content update highlights and new features.
Part of a six-month attack, email accounts on the NHS’ Microsoft 365 instance were compromised, resulting in over 1,100 targeted email attacks…
A smishing campaign is impersonating the UK-based delivery company Evri with text messages informing recipients that their package couldn’t be…
The India-aligned APT SideWinder is using a variety of social engineering techniques to target Pakistani government and military entities, …
Part of a six-month attack, email accounts on the NHS’ Microsoft 365 instance were compromised, resulting in over 1,100 targeted email attacks…
As cybercriminal groups hone their craft, one analysis shows them shying away from zero-day exploits, use of valid accounts, and third-party …
The rise of Ransomware-as-a-Service has given rise to a number of more successful groups who have their “business” down to a simple exercise …
Accounting software provider Intuit has warned of a phishing scam targeting its customers, BleepingComputer reports. The phishing campaign …
One of the most important things I have tried to communicate to audiences since at least the 1990s is how prevalent a role social engineering …
Consumer Affairs reported on how big of a problem SMS phishing scams have become, and how it's about to get a lot worse. According to a recent…
A joint operation by INTERPOL and the cybercrime unit of the Nigeria Police Force have concluded a yearlong investigation into the …
With the much-anticipated annual Verizon Data Breach Investigations Report finally released, we get a view of ransomware from the data breach …
Scammers are using deepfake videos of Elon Musk in an attempt to trick people into handing over cryptocurrency, BleepingComputer reports. The …
A new scam borrows a page from the tech support scams that target older victims telling them potential fraud has been found, offering to …
So-called “Black Hat SEO” services have popped up on Dark Web forums bringing advantageous search results to anyone willing to pay a small …
Scammers use an “overdue tax bill” along with a sophisticated and obfuscated javascript-based “invoice” attachment to identify targeted …
FBI Director Christopher Wray highlighted China’s role in cyberespionage in a recent 60-Minutes news segment, saying the level of attacks the …
Researchers at Trustwave have observed a phishing campaign that uses a chatbot to add legitimacy to the scam. The chatbot is on a harmless …
“We want compliance training to be impactful like your security awareness training.”
New analysis of threat activity for the first quarter of this year shows anyone with access to corporate email is a now on the front lines of …
Tell people not to click a link, pat each other on the back, and ride off into the sunset. If only security awareness training was that simple…
Researchers at Vade Secure warn of a large phishing campaign that's impersonating shipping giant Maersk to target thousands of users in New …
Whoa Nellie, that's getting to be real money here. This is the kind of thing that starts cutting into your whole IT budget.
Researchers at Fortinet observed a spear phishing attack that targeted a Jordanian diplomat late last month. The researchers attribute this …
Scammers use a variety of tried-and-true tactics to trick people, according to André Lameiras at ESET. For example, they can easily find …
A new lawsuit brings to light the all-too common occurrence of a attack, with this occurring during a business acquisition and costing the …
A March 2022 report from the Senate Committee on Homeland Security and Governmental Affairs zeros in on the growing problem of ransomware and …
Months after the MailChimp data breach targeting 102 companies in the crypto sector, a new lawsuit has been filed seeking millions of dollars …
Taking advantage of heightened levels of customer trust and satisfaction, along with lowered levels of properly implemented security, credit …
While Russia consistently denies any launching of cyberattacks, attack details point to reasonable intent by and cybercriminal ties to the …
Researchers at Varonis warn that attackers are using customizable URLs (also known as vanity URLS) on SaaS services to craft more convincing …
We are proud to announce that TrustRadius has recognized KnowBe4 with a 2022 Top Rated Award.
Researchers at Netskope have observed a 450% increase in phishing downloads over the past twelve months, largely driven by attackers using SEO…
The China-based threat actor Mustang Panda is conducting spear phishing campaigns against organizations in NATO countries and Russia, as well …
Tricky SMTP Relay Email Spoofing. Man Convicted For 23M Phishing Scam. Email not displaying? | View Knowbe4 …
Criminals in London are targeting digital currency investors on the street in a wave of “crypto muggings”, with victims reporting that …
The FBI last week published a public service announcement updating its warnings about the continuing threat of business email compromise (BEC,…
It feels like we hear about a new devastating cyberattack in the news every day. And attack methods seem to be proliferating at an exponential…
Check out the 67 new pieces of training content added in April, alongside the always fresh content update highlights and new features.
Researchers at Recorded Future’s Insikt Group warn that the Russian threat actor NOBELIUM (also known as APT29 or Cozy Bear) is using …
As we observe World Password Day to create awareness around the need for password security, Microsoft is looking for frictionless ways to …
Researchers at Avanan have observed a surge in phishing emails that abuse a flaw in SMTP relay services to bypass email security filters.
With the number of email breaches per year almost doubling in the last three years, organizations still don’t see email security solutions as …
As detection times are reducing across the board, threat groups are improving their craft and are prioritizing speed as the key ingredient in …
New data from TrendMicro and Ponemon shows how almost organizations globally are not fully prepared for the looming threat of almost-certain …
A man in California has been convicted for stealing $23.5 million from the US Department of Defense in a phishing attack. The Justice …
I recently attended a customer’s annual security awareness training employee event. I have attended a bunch of these over the years and I have…
A phishing campaign is using short, terse emails to trick people into visiting a credential-harvesting site, according to Paul Ducklin at …
With ransomware attacks on the increase, new data shows a material portion of small and medium business organizations are completely …
New data shows IT leadership believes users outside of IT create a “continued significant risk to organizations” despite having a layered …
As the number of ransomware attacks has increased 24% over the previous year, security researchers estimate the total associated attack costs …
Researchers at IBM Security X-Force are tracking a financially motivated cybercriminal group called “Hive0117” that’s impersonating a Russian …
Despite the world’s best efforts to get everyone off passwords and onto something else (e.g., MFA, passwordless authentication, biometrics, …
By breaking into an attack server, security researchers have uncovered new details that show the connection between the Karakurt group and …
New data from the Identity Theft Resource Center shows rises in the number of data compromises following 2021’s record-setting year, all …
As supply chain vendors become a greater target, the businesses reliant upon them don’t seem to be responding with the appropriate urgency, …
Threat actors are sending out the stealthy “more_eggs” malware in spear phishing emails that target hiring managers, according to researchers …
It’s not just deep-pocketed corporations that prove attractive targets for social engineering. Any organization that holds information that …
The latest scam targeting T-Mobile customers impersonating T-Mobile and focused on collecting your personal data by tempting you with free …
Social media companies, particularly LinkedIn, are now the most impersonated brands in phishing campaigns, researchers at Check Point have …
A new phishing campaign impersonates MetaMask, informs victims their cryptocurrency wallets aren’t “verified” and threatens suspension.
In a recent article about the largest cyberthreats currently facing the UK, John Edwards – the UK’s newly-appointed information commissioner- …
In a joint multi-country cybersecurity advisory (CSA), governments are warning their respective critical infrastructure organizations to be …
North Korea’s Lazarus Group is using social engineering attacks to target users of cryptocurrency, according to a joint advisory from the US …
New data from Recorded Future shows how the war in Ukraine is causing a brief slowdown of ransomware attacks on healthcare, governments and …
A new study published by Ponemon Institute shows that a material portion of organizations are still using pre-pandemic security processes and …
The FBI has warned of a smishing campaign that’s targeting people in the US with phony bank fraud notifications. The text messages inform …
A phishing campaign is targeting African banks with a technique called “HTML smuggling” to bypass security filters, according to threat …
Attackers are spamming multifactor authentication (MFA) prompts in an attempt to irritate users into approving the login, Ars Technica …
KnowBe4's latest quarterly report on top-clicked phishing email subjects is here. We analyze the top categories, general subjects (in both the…
The latest podcast episode of Security Masterminds features our special guest Jim Shields, Creative Director at KnowBe4. He sat down with our …
In today's connected world, nearly everyone has a story where they have been targeted by a scam and either that person or someone they know …
Organizations like yours use regulatory guides and compliance frameworks as the foundation of their list of controls. You can easily have many…
As ransomware costs increase, along with the effectiveness and use of extortions, smaller businesses are paying the price, according to new …
New data from the U.K. Government’s Cyber Security Breaches Survey 2022 report shows that a material portion of businesses and charities are …
Impersonating legitimate companies and using a complex mix of fake personas across Facebook, Telegram, and other platforms, these groups used …
Researchers at Trend Micro have spotted yet another scam taking advantage of the crisis in Ukraine by impersonating a legitimate charity. In …
CyberheistNews Vol 12 #15 | Apr. 12th., 2022 [Heads Up] Hard-boiled Social Engineering by a Fake "Emergency Data …
Organizations in the US lost $2.4 billion to business email compromise (BEC) scams (also known as CEO fraud) last year, according to Alan …
Taking advantage of the value of a legitimate web service, along with a valid SSL certificate, a new campaign of phishing attack targeting …
We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) …
We are excited to announce that KnowBe4 has been named a leader in the Spring 2022 G2 Grid Report for Security Orchestration, Automation, and …
Skyrocketing attack rates, double and triple extortion, increasing ransom demands… cybercriminals are inflicting pain in every way imaginable …
A phishing campaign impersonating WhatsApp has targeted more than 27,000 mailboxes, according to researchers at Armorblox. It’s not clear who …
New insights into the state of data security show a clear focus on the weakest part of your security stance – your users – and organizations …
Last month, Latvian and Lithuanian police – in conjunction with Europol – coordinated a raid on 3 call centers responsible for an …
Stolen client data from Mailchimp put customers of the cryptocurrency hardware wallets on notice of potential social engineering attacks …
Scammers are impersonating Europol with fraudulent phone calls in an attempt to steal personal and financial information, according to …
The group behind the recent attacks on Okta, NVIDIA, and Microsoft may be moving on to less-prominent organizations, using their data …
It appears that the use of Microsoft CHM files is gaining popularity, and from the way this latest attack works, it’s a rather ingenious and …
Cybercriminals Groups and “as a Service” threat actor affiliates alike seem to be doing well, according to a new report on the state of …
Social engineering continues to be a core component of the Iranian government’s hacking operations, according to researchers at Recorded Future.
[EYE OPENER] A Lack of Employee Cyber Hygiene is the Next Big Threat Email not displaying? | View Knowbe4 Blog …
Bloomberg has reported that forged "Emergency Data Requests" last year induced Apple and Meta to surrender "basic subscriber details, such as …
Check out the 74 new pieces of training content added in March, alongside the always fresh content update highlights and new features.
Rather than take the usual path of sending an email and linking to a spoofed logon page, this attack takes a different set of actions that at …
A look at what makes up Web 3.0 and how it may be used includes insight into what kinds of cyberattacks may plague it, as cybercriminals look …
New data from the FBI’s Internet Crime Complaint Center (IC3) shows a massive increase in the cost of internet crimes, with phishing and BEC …
A widespread phishing scam is circulating in Facebook Messenger, according to Jeff Parsons at Metro. The phishing messages simply contain the …
The FBI has issued a Private Industry Notification warning of phishing emails designed to steal login credentials from election officials. The…
A new report suggests that everything from endpoints, to passwords, to training, to security policies, to a lack of awareness is all …
A new report reviewing ransomware activity in 2021 shows an impressive uptick in the number of targeted attacks in Q4 of 2021 to 772 as more …
The shift in devices used by today’s workforce has resulted in increases in cybersecurity concerns and incidents, despite a majority of orgs …
[Heads Up] Published Zelenskyy Deepfake Video Demonstrates the Modern War is Online Email not displaying? | View Knowbe4 Blog …
Researchers at Intezer warn that attackers are hijacking email conversations to distribute the IcedID banking Trojan. This technique makes the…
I used to be a huge fan of Push-Based Multifactor Authentication (MFA), but real-world use has shown that most of today’s most popular …
Fraudsters are taking advantage of the buy-now, pay-later (BNPL) payment model, according to Jim Ducharme, COO of Outseer. On the CyberWire’s …
WIRED wrote: "More than 22,000 miles above Earth, the KA-SAT is locked in orbit. Traveling at 7,000 miles per hour, in sync with the planet’s …
Fidelity just published an article titled "Cybersecurity: A growing risk". They note that the threat of Russian cyberattacks highlights …
Scammers continue to exploit the crisis in Ukraine, according to researchers at Bitdefender. Over the past week, the researchers believe the …
Google’s Threat Analysis Group (TAG) describes a cybercriminal group it calls “EXOTIC LILY” that acts as an initial access broker for numerous…
When it's time to complete a compliance audit, are you thinking, "Ugh, is it that time again?" And, as more organizations demand proof that …
New data from the Anti-Phishing Working Group shows cybercriminals are stepping on the gas, focusing phishing attacks on credential theft and …
In an unusual turn of events, a recent court decision sided with the policyholder, despite specific policy language that probably should have …
As if stealing all your credentials, cookies, and email wasn’t bad enough, this new version of QakBot inserts itself into your emails, …
This simple invoice scam appears to be a part of a much broader campaign targeting municipalities, posing as existing subcontractors.
Researchers at Avanan warn that attackers are using reCAPTCHAs on their phishing sites to avoid detection by security scanners.
The video uploaded to a hacked Ukrainian news website shows how far the technology has come, how it can be used in social engineering, as well…
New data shows phishing, social engineering, and impersonation dominate as cybercriminals are becoming more frequent and successful with their…
[New White House Alert] Train Your Users Against Threat of Russian Cyberattacks Email not displaying? | View Knowbe4 Blog …
With the recent cyber-attacks between Russia and Ukraine and the current intelligence coming from the US Government, organizations want to …
One of the challenges cyber criminals face is that their scams often have a relatively short shelf-life. Once they’ve been used, the gaff is …
There is a new ransomware-as-a-service (RaaS) strain called LokiLocker, researchers at Blackberry warn. The malware uses rare code obfuscation…
We’re thrilled to announce that KnowBe4 has been named a Leader in The Forrester WaveTM : Security Awareness and Training Solutions, Q1 2022 …
New insight into the state of the attacks and threats paints a picture where the cybercriminals are growing in number, sophistication and …
New data puts the spotlight on how most organizations unable to completely recover their data after a ransomware attack, making the case for …
Despite cloud vendors like Google detecting reverse proxies or man-in-the-middle (MiTM) attacks and halting logons to thwart malicious …
Newly discovered data-destroying malware was found this week in attacks targeting Ukrainian organizations and deleting data across systems on …
I am a member of OODA loop. They are a great team that keeps me up to date about InfoSec issues. Their site always has interesting articles …
[Heads Up] FBI: Ransomware Gang Breached 52 US Critical Infrastructure Orgs Email not displaying? | View Knowbe4 Blog …
Shipping fraud had a global increase of nearly 800% over the course of 2021, according to TransUnion’s 2022 Global Digital Fraud Trends Report.
The cybercrime market has skyrocketed in a frightening way. With threats such as ransomware to Business Email Compromise (BEC), the stakes are…
Email is the familiar form of phishing, but there’s an ongoing criminal campaign that follows a different, arguably subtler avenue of …
New analysis of attacks in 2021 show massive increases across the board, painting a very concerning picture for this year around cyberattacks …
Researchers at Malwarebytes warn of a phishing campaign that’s targeting the oil and gas industry by impersonating Saudi Aramco.
As part of either impersonating known brands or simply leveraging credible cloud services, the use of a web page as part of an attack has …
New data focusing on user cyber hygiene around password use shows users are repeatedly reusing passwords across multiple applications and …
The unprovoked attack on the Ukrainian people, and subsequent humanitarian crisis it has caused, is an unacceptable act of aggression by the …
With 2021 being the “testing ground” for ransomware extortion, 2022 is showing signs of ransomware gangs settling in on proven extortion …
As details of the February attack continue to be divulged, it becomes evident that cybercriminals were able to get past both users and …
New data from Sonicwall shows the numbers of nearly every type of attack growing in 2021, with concerns by organizations about attacks and …
Researchers from Secureworks’ Counter Threat Unit (CTU) are tracking phishing domains used by the “MOONSCAPE” threat actor to target users in …
Facebook overtook Microsoft as the most impersonated brand in phishing attacks last year, according to a new report from Vade Secure.
[Heads Up] A New Phishing Attack Warns About A Suspicious Russian Login Email not displaying? | View Knowbe4 Blog …
We’re thrilled to announce the long-awaited fourth season of the award-winning KnowBe4 Original Series - ‘The Inside Man’ is now available in …
The US Federal Bureau of Investigation (FBI) says the Ragnar Locker ransomware gang has breached the networks of at least 52 organizations …
Scammers are sending phony text messages (aka Smishing or SMS Phishing) informing people in the US that they’ve been drafted by the US Army, …
The Log4j vulnerability caused widespread panic for IT professionals when it was uncovered. Sleepless nights followed for many. But a …
RCE. These three letters add increased levels of stress to cybersecurity professionals regarding vulnerabilities against their hardware or …
Imagine needing to share a large PDF non-confidential document with a customer. It is too large to send via email, and recently you started …
During the period the world has dubbed “the great resignation”, phishing scammers are shifting tactics to take advantage of those looking for …
In a new twist on an old scam, BEC attacks switch from email to a virtual meeting where social engineering tactics are used to further …
New advisory sees critical infrastructure once again in the crosshairs and makes critical recommendations to both protect against ransomware …
Check out the 28 new pieces of training content added in February, alongside the always fresh content update highlights and new features.
A real US Army colonel named Daniel Blackmon is being impersonated in hundreds or even thousands of romance scams, according to Haley Britzky …
We’re thrilled to introduce the Security Culture Maturity Model, the industry’s first maturity model specifically geared to measure security …
New data shows despite decreases in global data breach levels (-5%) in 2021, the U.S. experienced proportionally more data breaches than in …
A new series of "help Ukraine" donation posts have sprouted up across the Internet, but are really a cryptocurrency scam enticing users send …
With mobile devices used as secondary authentication, threat actors have been stepping up activity, looking for ways to transfer phone numbers…
New data obtained from the UK’s Information Commissioner’s Office by think tank Parliament Street shows an unprecedented rise in attacks …
Researchers at Malwarebytes warn that a phishing campaign is informing users that someone logged into their account from an IP address in …
[Heads Up] The Ukraine War Started A New Wiper Malware Spillover Risk Email not displaying? | View Knowbe4 Blog …
New IRS requirements will soon be used as phishbait, according to Gene Marks, owner of Marks Group PC and a columnist for the Guardian.
NextGov reports: "Chairman Sen. Mark Warner, D-Va, gives an opening statement as FireEye CEO Kevin Mandia, SolarWinds CEO Sudhakar …
In a post Wednesday last week, Microsoft issued a warning that they are seeing a brand new type of blockchain-centric attack aimed at web3 -- …
It’s easy to forget, when a hybrid war like the one currently raging in Ukraine is occupying so much attention, that ordinary criminal …
New analysis of ransomware attacks shows growth in the number of active strains, ransoms collected, and use of third-party services all adding…
With an ongoing land war in Ukraine, everyone needs to be alert for the Kremlin's parallel disinformation campaigns. Many people simply are …
Use of QR codes is becoming a mainstream part of advertising, but also is getting the attention of scammers intent on redirecting you to a …
The war in Ukraine increases the risk of wiper malware to spill over. I'm sure you remember NotPetya, which caused billions of dollars of …
Organizations that are not using Microsoft’s multi-factor authentication are finding themselves victims of credential attacks that involve …
A sextortion phishing campaign is targeting French speakers accusing them of viewing child abuse content, according to Paul Ducklin at Naked …
There are a lot of scams in the world, and they seem to be proliferating at an exponential rate. My Facebook friend’s accounts are compromised…
CyberheistNews Vol 12 #08 | Feb. 22nd., 2022 [Eye Opener] Here Are the 4 Traits of Most Scams Written by Roger …
Phishing attacks on social media doubled over the course of 2021, according to a new report from PhishLabs by HelpSystems. Most (68%) of these…
Used to disguise malicious file extensions, this legacy functionality is being repurposed in attacks to obfuscate attachment types and steal …
This banking trojan-turned-information-stealer has been around for nearly 15 years. But its latest iteration – seen even in the past few weeks…
A phishing campaign is targeting users of the UK-based digital banking company Monzo, BleepingComputer reports. Security researcher William …
Meta (Facebook’s corporate parent) and the digital banking company Chime have filed a joint lawsuit against two Nigerian citizens for …
[Heads Up] FBI Warns Against New Criminal QR Code Scams Email not displaying? | View Knowbe4 Blog CyberheistNews Vol …
If you think the only way your network and devices can be compromised via email is phishing, think again!
Scams follow fashion because money follows fashion. So it’s no surprise that non-fungible tokens (NFTs), which have become a hot speculative …
In the wake of the great reset, cybercriminals are finding success posing as legitimate companies in job postings seeking new hires on …
Read More Single-cloud environments are said to be redundant. One expert disagrees and explains why. The post Why multicloud environments can help …
Read More Get to know the ins and outs of cyber threat intelligence and how your company's security can be can be strengthened by putting threat …
Read More If you'd like a little more privacy when surfing the web, Firefox offers a few different options to defend yourself against trackers. The …
Read More A password generator can help when you need a strong and complex password to protect an account. The post How to generate secure passwords…
Read More Corporate users are more aware of phishing attacks in their mailboxes. Yet they are not used to being targeted via other systems like …
Read More Learn how to securely store notes along with your account credentials with iCloud Keychain and sync them to all of your Apple devices. The…
Read More To build an effective ICS cybersecurity strategy, it is crucial to identify the security events that are most likely to occur. This will …
Read More When it comes to IT, disruption is just another day at the office. From fending off cyberattacks to incorporating leading-edge …
Read More Giving employees the flexibility to be fully productive while working remotely makes it critical that businesses have endpoint security …
Read More Cybersecurity is critical in today's online world. Whether you're a business or a private individual, you need a VPN. Try this one while …
Read More It was a banner year for online fraudsters. Almost every industry saw an attack spike, with online fraud jumping 85% year over year in …
Read More The only category to decrease was malware attacks, but SonicWall said in its report that even that number was deceptive. The post Report:…
Read More Data privacy software can help protect your employees, customers and organization by ensuring data is protected and handled appropriately …
The healthcare sector is particularly vulnerable to phishing attacks, according to Mike Azzara at Mimecast. Employees in the healthcare …
We're excited to announce that we have launched a new podcast called "Security Masterminds”! This podcast covers a range of topics in …
Ransomware is one of the most damaging types of cyber attacks of all time, and the one feared the most by business owners and cybersecurity …
Abusing cloud providers including Microsoft Azure and AWS, cybercriminals are setting up malicious infrastructure to hide their operations and…
Even after the pandemic ends, many employees say they want to stay home and continue to work remotely. A recent study by the Mckinsey & …
Read More In 2021, securing your network is more challenging than ever – you need to secure users, devices, apps, and data at the point of access, …
Read More Blackberry details a number of different threats of concern for enterprises to be aware of in the year ahead. The post Blackberry report …
Read More Dubbed TA2541 by Proofpoint researchers, the group has been attacking targets in several critical industries since 2017 with phishing …
Read More Giving employees the flexibility to be fully productive while working remotely makes it critical that businesses have endpoint security …
Read More When it comes to IT, disruption is just another day at the office. From fending off cyberattacks to incorporating leading-edge …
Read More The federal agency says hundreds of victims have lost money due to scams over a two-year span. The post FBI: Criminals escalating SIM swap…
Read More iPhones, iPads and the iPod Touch are all at risk, and it doesn’t matter what web browser you use: All of them could let an attacker …
Read More Code42’s study goes into detail about the risks facing cybersecurity leaders and practitioners in the wake of the Great Resignation. The …
Read More Virtual worlds need strong and enforceable rules to avoid the harassment and stalking so common on social media platforms. The post Why a …
Read More To keep your Facebook Messenger conversations private and secured, you should start using the new end-to-end encryption feature. Jack …
Read More Tom Merritt offers five great options if you’re ready to dump Google Chrome for good. The post Top 5 alternatives to Chrome appeared first…
Read More Stay safe online while simplifying your life with a password manager. Here are some to try at great prices. The post 5 password manager …
Read More Perimeter 81’s cloud-delivered, user-friendly platform offers a seamless SaaS interface with a feature-rich experience including built-in …
Read More Proofpoint researchers have found that “phish kits” available for purchase online are beginning to adapt to MFA by adding transparent …
Read More Remote password changes on company-issued workstations can sometimes yield chaotic results. Follow these best practices to help ensure you…
Read More Electronic data is likely to be more prevalent in today’s organizations than physical printed data. Reams worth of documents can now be …
Read More What does data security really mean? Terry Ray, SVP and fellow with Imperva, talks about how companies need to think about data privacy in…
Read More We often hear and read about digital security, but digital safety concerns have also become a key issue for online platforms, creating a …
Read More GitLab's VP of security talks about the efficiencies that DevSecOps brings to developers and the software development process. The post …
Read More Bringing big data governance and security up to the level of practice applied to structured data is critical. Here are five ways to get …
Read More You can use the privacy-oriented search tool through desktop browser extensions and a mobile app. The post How to use DuckDuckGo on your …
Read More Bitwarden makes it easy to share items from within the password manager to teams and other groups of users. Jack Wallen shows you how to …
Read More IBM developer advocate and the founder of Snyk talk about changing the way developers think about cybersecurity. The post IBM and Snyk: …
Read More The Secureworks Counter Threat Unit™ (CTU) research team analyses security threats and helps organizations protect their systems. During …
Read More The XDR market is confusing, as is often the case with new security technologies Don’t wait to be proactive about your organisation’s …
Read More First spotted targeting APAC countries in 2018, Roaming Mantis recently received updates allowing it to steal more data and has begun …
Read More Ransomware remains the number one threat for most organisations. This report comprehensively examines the adversary’s ongoing innovation …
Read More A report from Claroty finds ransomware attacks against critical infrastructures rampant, and paying ransoms often results in less downtime…
Read More Security analysts found 33 weak points in MMQT, a frequently used protocol that rarely involves authentication or encryption. The post …
Read More APT group Armageddon was identified as acting against Ukraine late last year, and Symantec’s own data backs up that presented by The …
Read More Those traveling to China for the 2022 Winter Olympics have been advised to bring burner phones. Here’s how to use travel tips like that …
Read More Flashpoint and Risk Based Security’s report found that, despite early reports, the total number of breaches is likely much higher than …
Read More The hacker that made off with millions from blockchain bridge service Wormhole exploited an incredibly common coding error that could be …
Read More Cybersecurity incident response is not only about handling an incident – it’s also about preparing for any possible incident and learning …