Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

TurboTax SMS Scam

It is tax season in the United States and that means plenty of tax scams. I recently received these SMS messages.

Phishing Simulation: How It Works to Reduce Risk

Phishing isn’t just increasing. It’s outpacing the way many organizations test for it. Attacks have surged 400% year over year, and corporate users are now more likely to be targeted by ...

How to Identify a Phishing Website

Our increasing dependence on the internet and, specifically, email for business and personal communication has produced the perfect environment for cybercriminals to launch phishing ...

How Risky is Sending a Sensitive Work Email to the Wrong Person?

Sending a work email to the wrong person – it’s something all of us have done at least once in our working lives. For some people, it’s a regular occurrence. But just how risky is it?

The Case for Behavioral AI in Legal Email Security

For legal organizations, the integrity of communication isn't just a business requirement, it’s a foundational pillar of the profession. Whether it’s a sensitive case strategy, a ...

Common Facebook Scam Method

A friend posted this on Facebook and it came up on my feed.

The Rise of Kratos: How the New Phishing-as-a-Service Kit Industrializes Cybercrime

Lead Analysts: Jeewan Singh Jalal, Prabhakaran Ravichandhiran and Anand Bodke By the end of 2026, over 90% of all credential compromise attacks are estimated to be enabled by modular ...

Nation-State Threat Actors Incorporate AI to Streamline Attacks

Researchers at Google’s Threat Intelligence Group (GTIG) warn that nation-state threat actors have adopted Gemini and other AI tools as essential components of their operations. The ...

Google Reports On Adversarial Use of AI in Late 2025

Google Threat Intelligence Group recently released its latest report, “GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Us,” on how ...

Fake Video Meeting Invites Trick Users Into Installing RMM Tools

Threat actors are using phony meeting invites for Zoom, Microsoft Teams, Google Meet, and other video conferencing applications to trick users into installing remote monitoring and ...

Introducing the AIDA Orchestration Agent: Always-On Human Risk Management Has Arrived

Social engineering remains the most reliable way into an organization—and attackers are getting better at it every day.

Integrated Cloud Email Security (ICES) vs Secure Email Gateway (SEG)

Cybercriminals continually evolve their techniques, leading to more successful phishing attacks. Using techniques such as text-based attacks that utilize social engineering and highly ...

What Happens If I Click A Phishing Link?

Phishing is the most prominent form of cyber-attack, regularly prompting email recipients into disclosing their personal information, credentials, downloading malware, or paying ...

How To Recall An Email In Outlook

Independent research shows that 91% of organizations have experienced outbound email security incidents in their Microsoft 365 environments. Human error is the primary cause of these ...

Humans Will Give AI Anything If You Make It Sound Cool Enough

There's a beautiful moment happening right now, and by "beautiful" I mean "horrifying in that can't-look-away-from-the-car-crash sense”.

AI-Assisted Social Engineering Attacks Continue to Rise

Social engineering remained the top initial access vector for cyberattacks in 2025, with increasing assistance from AI tools, according to a report from ThreatDown. The researchers warn ...

How To Recall An Email In Gmail

People accidentally send emails to the wrong recipients every day. The impact of these incidents can be relatively minor if there is no sensitive data included in the email body or ...

Report: AI-Driven Fraud Surged by 1200% in December 2025

AI-driven fraud attacks spiked by more than 1200% in December 2025, according to a new report by Pindrop Security. Threat actors are using AI to assist in every stage of the attack, from ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.