Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

KnowBe4 Team

KnowBe4 Team

The KnowBe4 Team delivers timely, expert-driven insights on cybersecurity trends, emerging threat intelligence, human risk best practices, compliance strategies and industry research to help organizations strengthen their human defense layer and stay informed, resilient, and secure.


Recent Posts

Custom Fonts Can Trick AI Assistants Into Approving Phishing Sites

Researchers at LayerX warn that custom fonts can fool AI web assistants into thinking phishing pages are benign, while the human user sees something completely different.

How Adaptive Email Security Helps Navigate Threats in the Age of AI

A finance employee receives an email that appears to come from the CFO requesting urgent payment approval. The message references a current project, uses the correct tone, and arrives at ...

Report: Attackers Can Trick AI Assistants Into Displaying Phishing Messages

Researchers at Permiso warn that threat actors can plant phishing messages within Copilot AI summaries. Notably, the researchers found that attackers can trick Copilot into including ...

Why Financial Firms are Outgrowing Traditional Email Security

In the financial services industry, a "security incident" is rarely just an IT ticket. It is a regulatory event. Whether you are a bank, a global investment firm, or a fintech startup, ...

Scammers Abuse Calendar Invites to Plant Phony Subscription Notices

Malwarebytes warns that a phishing campaign is using Google Calendar invites to send phony renewal notices for Malwarebytes subscriptions. The calendar invites contain a phone number that ...

Why Your Human Risk Management Strategy Can’t Ignore AI

AI isn’t just another technology wave—it’s a force multiplier for both innovation and risk. In a recent webinar featuring insights from Bryan Palma and guest speaker Jinan Budge, Vice ...

The ‘Urgency Trap’: Why Time Pressure is Your Biggest Email Red Flag

The old rules for spotting a phishing email are changing. Remember looking for bad grammar and clumsy spelling? Thanks to AI, hackers' emails are increasingly polished and hard to spot. ...

Inside Our 'Human Risk: In-Person Experience' in Leeds

Last week, our KnowBe4 Leeds office opened its doors to a group of security professionals for an immersive, full-day deep dive into the evolving landscape of human risk.

Shipping-Themed Phishing Scams Target the Middle East and Africa

A surge in shipping-related phishing scams is targeting the Middle East and Africa (MEA) region, according to researchers at Group-IB.

What is Integrated Cloud Email Security (ICES) and Why do you Need It?

Integrated cloud email security (ICES) is a term coined by industry analyst, Gartner, in their 2021 Market Guide for Email Security. The guide was reissued in 2023 and stated that ‘by ...

Received Someone Else’s Confidential Email? Here’s What To Do.

When we think about misdirected email, we often put ourselves in the shoes of the sender. After all, nobody wants to tell their manager that they might (however accidentally) be ...

Email DLP: Everything You Need to Know

What is Email Data Loss Prevention (DLP)? Traditionally, email data loss prevention software has used static rules to stop users from emailing sensitive or confidential data. ...

FBI: Phishing Attacks Are Impersonating City and County Officials

The US Federal Bureau of Investigation (FBI) has issued an advisory warning of a phishing campaign that’s impersonating city and county officials to send phony requests for permit fees.

How Do I Send a Secure Email in Outlook?

Sending an unsecured email can be likened to writing sensitive information on a sticky note and leaving it on someone else's desk: anybody can intercept and share that information. ...

Ransomware Attacks Surge by 50% Even as Payments Drop

The number of ransomware attacks increased by 50% in 2025, even though the number of victims who decided to pay the ransom fell to an all-time low, according to a new report from ...

Announcing the Custom SAPA Agent: Security Awareness Measurement Built for Your Environment

Security awareness programs are built on measurement. Before you can reduce human risk, you need a clear understanding of where knowledge gaps exist across your workforce. For many ...

9 Must-Know Best Practices for Email Security

More than 90% of successful cyberattacks start with email, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). That’s not because security teams lack tools, but ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.