Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Cybersecurity Top Risk Consideration In Board Room

The Wall Street Journal polled its readers and asked them to rate the top compliance issues of 2014. The answers were very interesting!
Continue Reading

Schneier: Sony Hackers May Have Had Inside Help

Well-known IT Security guru Bruce Schneier commented on recent discoveries related to the Sony Hack. First of all, an analysis of the timestamps on some of the leaked documents shows that ...
Continue Reading

Defense In Depth: Your Answer To Social Engineering

Organizations defend their networks on each of the six levels in the green graph you see. End-user Internet Security Awareness Training resides in the outer layer: ‘Policies, Procedures, ...
Continue Reading

New ransomware called "extortionware" in 2015? Not so much...

TK Keanini, CTO, Lancope wrote a 2015 Predictions editorial over at SC Magazine. He said he expects more malware like CryptoLocker and CryptoWall over the next 12 months, but also ...
Continue Reading

A new strain of "ransomware" is striking

Mitch Lipka of CBS Moneywatch wrote:
Continue Reading

2015 Crystal Ball / Three Scams To Warn Your Users About

CyberheistNews Vol 4 #51 Dec 30, 2014 2015 Crystal Ball / Three Scams To Warn Your Users About During my 15-year stint as the editor of WServerNews, I always started the year with a ...
Continue Reading

Three Scams To Warn Your Users About

It's the holidays and the bad guys are working overtime. There are three scams you want to warn your users about. Remember the Phil Esterhaus character in Hill Street Blues? To begin ...
Continue Reading

Security Awareness Training in 2015

Lance Spitzner at the SANS Securing The Human program and I have a lot in common; we evangelize effective security awareness training and we both drive a Tesla. In his 22 December 2014 ...
Continue Reading

Cybercrime group steals millions from Russian banks and targets US

This is actually quite interesting, hackers that are successful inside Russia, as normally these guys are shut down by the FSB in a heartbeat. It must be that they are outside of the ...
Continue Reading

Nine Data Breaches That Cost Someone Their Job

Following last year’s big announcement of not just Target’s data breach but executive job loss, CSO lays out 9 data breaches resulting in job loss. They compare Target alongside other ...
Continue Reading

Sony Pictures Cyber Attack TIMELINE

This Sony Pictures Cyber Attack TIMELINE by the www.databreachtoday.com site is quite interesting.
Continue Reading

Announcing InfoSec World 2015

MIS Training Institute (MISTI) and their esteemed Advisory Board are excited to present the InfoSec World 2015 Conference & Expo. KnowBe4's CyberheistNews is a Media Sponsor for the ...
Continue Reading

Phishing Attack on German Steel Factory System Caused Massive Damage

Hackers breached security of a German steel mill's network and caused considerable damage by manipulating the controls of a blast furnace. The attackers gained access to the network ...
Continue Reading

CyberheistNews Vol 4 #49 Dec 23, 2014

Lessons Learned From The Sony Pictures Hack Bruce Schneier reminded me of an old but very relevant concept in IT Security. There are two types of attacks: opportunistic and targeted. And ...
Continue Reading

Scam of The Week: LinkedIn Greeting Cards Carrying Malware

System admins hold the keys to the kingdom. The NSA is actively hunting for system admin credentials. A popular way to get you to click on something that installs zero-day malware on your ...
Continue Reading

Malware Used To Wipe Sony's Drives Was Quick And Dirty

It's still not clear (and it may never be discovered) how the Democratic People's Republic of (North) Korea (DPRK) hackers came in, perhaps they used all available threat vectors since ...
Continue Reading

Staples: 6-Month Malware Breach, 1.16 Million Cards

Office supply chain Staples Inc. today finally acknowledged that a malware intrusion by hackers this year at some of its stores resulted in a credit card breach. The company now says some ...
Continue Reading

Lessons Learned From The Sony Pictures Hack

Bruce Schneier reminded me of an old but very relevant concept in IT Security. There are two types of attacks: opportunistic and targeted. And then you can characterize attackers on two ...
Continue Reading

Malicious links: Spammers change malware delivery tactics

Symantec just put this out and I thought you might be interested. They are seeing a lot of hackers using Upatre and Ponik malware over the last couple of months, delivered by spam email ...
Continue Reading

I simply could not resist this vanity plate

Continue Reading

Hackers Spear-phish ICANN And Compromise DNS Zone System

It does not get any worse than this. Or better than this, if you are a criminal hacker. Domain-name management organization ICANN announced it has been hacked and its DNS zone ...
Continue Reading

[InfoGraphic] The Most Used InfoSec Words In 2014

We took almost 25,000 Hackbusters #infosec articles from 100+ feeds in 2014 and tabulated the hot topics. This "word-cloud" infographic is the result! What's Really The #1 Hot InfoSec ...
Continue Reading

New Ransomware called KEYHolder from CryptorBit Cybergang

Bleeping Computer had the scoop again: " A new ransomware has been released called KEYHolder that is from the same developers of CryptorBit . Like CryptorBit, this infection encrypts your ...
Continue Reading

CyberheistNews Vol 4 #48 Spike In Hoax News Spreading Malware

CyberheistNews Vol 4 #48 Dec 16, 2014
Continue Reading

Breaking News 2 New Ransomware Strains

#1 OphionLocker The first one is a new strain of ransomware named OphionLocker. It encrypts your data using strong open source Crypto++ Elliptical Curve Cryptography and then ransoms the ...
Continue Reading

Experts: The Human Factor Key Challenge To Information Security

The lack of awareness and understanding of risks is one of the biggest challenges to information security, according to a panel of experts. Research showed that 93% of data breaches ...
Continue Reading

Ransomware Beats APT In Terms Of Severe Impact

MalwareBytes Research showed that in the year 2014, 82% of companies were attacked online. Their research also showed that browser vulnerabilities will be the biggest challenge going ...
Continue Reading

Phishing Quiz: Can You Spot A Scam? Don't Be So Sure

Phishing Quiz: Can You Spot A Scam? Don't Be So Sure CBSNews wrote: "Phishing emails have gotten so convincing that even the experts can be taken in by a well-crafted fake. That's what ...
Continue Reading

Scam Of The Week: Spike In Hoax News Spreading Malware

The year 2014 has seen a boom on hoax news stories, as these are particularly successful social engineering tactics used by hackers to get people to click on links, and worse, share the ...
Continue Reading

Ransomware on National Public Radio: To Pay Or Not To Pay?

Aarti Shahani, the tech reporter of National Public Radio created a compelling story about the scourge of ransomware that is taking over America. The title of the story is:
Continue Reading

eWeek Alerts IT Pros About Self-Replicating Ransomware

Wayne Rash at eWeek picked up on the virRansom news and explained to his readers that this is a nasty new hybrid ransomware strain that needs to be protected against rather sooner than ...
Continue Reading

CyberheistNews Vol 4 #47 New Hybrid Ransomware Replicates Like A Virus

Heads Up! New Hybrid Ransomware Replicates Like A Virus Here is a powerful piece of ammo to get (more) IT Security budget. SophosLabs labs' blog reported about a new Ransomware strain ...
Continue Reading

How Was Sony Pictures Hacked?

Kevin Mandia, who was hired as the forensics expert wrote in a letter to Sony's CEO that the breach was unprecedented, well-planned and carried out by an "organized group". It's the most ...
Continue Reading

Phishing Lessons Learned in 2014? Employee Training Matters

Our friends at Wombat created a good summary why security awareness training is a must these days. Why?
Continue Reading

Top 10 InfoSec Pain Points

Continue Reading

Shipping Problem Phishing Attacks Here Is How They Look

Last CyberheistNews issue, we warned that Black Friday and Cyber Monday were behind us, and that criminal hackers have a "scam calendar" which focuses on major shopping events exactly ...
Continue Reading

Heads Up! Nasty New Hybrid Strain: The AIDS of Ransomware

Here is a powerful piece of ammo to get (more) IT Security budget.
Continue Reading

Sony The First To Be Hit With Destructive Payload

Sony has been hacked several times, and should have learned their lesson a while ago, but no. This time it is really bad though. Late yesterday the FBI warned U.S. business that the ...
Continue Reading

Savvy Hackers Use Spearphishing to steal Wall Street M&A info

What if you knew beforehand about mergers and acquisitions, and could trade with that inside information? Well that's been going on for more than a year.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews