Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Report: Microsoft Was the Most Impersonated Brand in Q4 2025

Microsoft was the most commonly impersonated brand in phishing attacks during the fourth quarter of 2025, according to researchers at Guardio. Microsoft was followed by Facebook, Roblox, ...

Phishing Campaign Abuses Google’s Infrastructure to Bypass Defenses

Researchers at RavenMail warn that a major phishing campaign targeted more than 3,000 organizations last month, primarily in the manufacturing industry.

AI Deepfakes Are Impersonating Religious Figures to Solicit Donations

WIRED reports that deepfake attacks are impersonating pastors and other religious figures in order to scam congregations.

Your KnowBe4 Fresh Compliance Plus Content Updates from December 2025

“Gave me good things to consider that I had not thought about as we move forward and AI becomes a part of our work processes!” Mobile-First Module Employees master current cyberthreats — ...

ConsentFix Attacks Fake Cloudflare Prompts

ClickFix attacks have been around for decades; only the name is new. ClickFix attacks use social engineering to trick users into clicking on buttons and links that the user is told are ...

Your KnowBe4 Fresh Content Updates from December 2025

“It was really good. I liked that it covered a lot of important subjects, focused on how to spot red flags, and used an AI deepfake demonstration.” Training Module Employees master ...

Phishing Campaign Targets WhatsApp Accounts

Researchers at Gen warn that a phishing campaign is attempting to trick users into linking malicious devices to their WhatsApp accounts.

Defending Against Modern Email Threats With Layered, AI-Driven Security

Email has been the backbone of business communication for decades and as such, it remains the attacker’s favorite doorway into an organization.

North Korean Threat Actor Spreads Malware via QR Codes

The North Korean threat actor “Kimsuky” is using QR codes to trick users into installing malicious mobile apps, according to security researchers at ENKI. The phishing sites, which ...

When Seeing Isn’t Believing: AI Images, Breaking News and the New Misinformation Playbook

In the early hours following reports of a U.S. military operation involving Venezuela, social media feeds were flooded with dramatic images and videos that appeared to show the capture of ...

Amazon Warns of Fraudulent North Korean Job Applicants

Amazon has blocked more than 1,800 suspected North Korean applicants from joining the company since April 2024, TechRadar reports. Amazon’s Chief Security Officer, Stephen Schmidt, said ...

New ConsentFix Technique Tricks Users Into Handing Over OAuth Tokens

Researchers at Push Security have observed a new variant of the ClickFix attack that combines “OAuth consent phishing with a ClickFix-style user prompt that leads to account compromise.”

Most Parked Domains Lead Users to Scams or Malware

Over 90% of parked domains now direct users to malicious content, compared to less than 5% a decade ago, according to researchers at Infoblox.

New BlackForce Phishing Kit Bypasses Multifactor Authentication

Zscaler has published a report on a new phishing kit dubbed “BlackForce” that uses Man-in-the-Browser (MitB) attacks to steal credentials and bypass multi-factor authentication. Notably, ...

81% of Small Businesses Sustained a Cyber Incident Over the Past Year

Eighty-one percent of small businesses suffered a security or data breach over the past year, and 38% of these businesses were forced to raise their prices as a result, a report from the ...

Be Careful of That Warrant for Your Arrest

A popular phone call/voicemail scam (i.e., vishing) involves someone calling you, claiming to be law enforcement with a warrant for your arrest, and then offers you an opportunity to ...

Unmasking the Deepfake Threat: A Game-Changer for Reducing Human Risk

Today, anyone can find a picture of absolutely anybody and it is also not difficult to find a sample of their voice. By combining these it is shockingly easy to create a realistic AI ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.