Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Chief Executive Officer & President

Stu Sjouwerman (pronounced “shower-man”) is the founder and CEO of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

Two-Thirds of Organizations Plan to Improve Their Cybersecurity in the Wake of Devastating Ransomware Attacks

With 81% of organizations believing ransomware attacks will become more prevalent in the second half of 2021, nearly everyone is preparing for the worst to come.
Continue Reading

Cyber Hygiene not a Focus for Cybersecurity Leaders, Despite Being Targets of Attacks Themselves

New findings from a survey of over 100 global cybersecurity leaders across all major industries sheds light on the apathy around needed proper cyber hygiene in their own lives.
Continue Reading

New Ransomware Strain Epsilon Red is Reported

Researchers at Sophos report finding a new ransomware strain in the wild. They call it “Epsilon Red.” The malware is written in GO, and it was delivered as the final executable payload in ...
Continue Reading

[Heads Up] Microsoft: SolarWinds hackers spear phish govt agencies from 24 countries

The Microsoft Threat Intelligence Center (MSTIC) has discovered that the SolarWinds hackers are behind an ongoing spear-phishing campaign targeting government agencies worldwide.
Continue Reading

New Email Attack Takes a Phishing-Turned-Vishing Angle to Steal Credit Card Info

Details on this new scam demonstrate how cybercriminal gangs are working to try use new mediums and social engineering methods to trick users into becoming victims.
Continue Reading

Get Prepared Now: New Executive Order Signals Cyber Regulations in the Future

The White House’s latest Executive Order on Improving the Nation’s Cybersecurity provides insight into what organizations should expect in the future and what they need to do today.
Continue Reading

Business Email Compromise Attacks Are Evolving, Becoming More Convincing and More Expensive

The “business” of BEC is becoming increasingly more lucrative for cybercriminals, as they develop new ways to defraud individuals and organizations of their money.
Continue Reading

New Would-Be Ransomware Attack Only Focuses on Stealing Data via the Java-Based STRAAT Malware

New details from Microsoft Security Intelligence discuss an attack that displays ransomware-like behavior, but simply seeks to install the credential theft-focused remote access trojan.
Continue Reading

Call Centers Used to Distribute BazarLoader

Cybercriminals are using call centers to trick users into downloading the BazarLoader malware, according to researchers at Palo Alto Networks’ Unit 42. By relying on social engineering to ...
Continue Reading

A Popular Fraud Combo is Back: Elon Musk and Bitcoin

Researchers at Bitdefender warn that cybercriminals continue to impersonate Elon Musk in Bitcoin scams. One campaign that started on May 15 involved sending thousands of emails telling ...
Continue Reading

UK Royal Mail Smishing Crew Nabbed By City Of London Police

According to a report by ZDNet, there were arrests made due to suspicions of sending 'smishing' texts. Smishing is a form of phishing that sends SMS messages in order to steal personal ...
Continue Reading

[On-Demand Webinar] Setting the Trap: Crafty Ways the Bad Guys Trick Your Users to Own Your Network Featuring Kevin Mitnick

The bad guys are out there, watching and waiting for an opportunity to strike. They have carefully researched your organization in order to set the perfect trap. And the perfect ...
Continue Reading

Low-Grade Ways of Bypassing Email Scanners

Cybercriminals are replacing common words in phishing scams with synonyms in order to bypass security filters, according to researchers at Avanan. For example, one phishing lure contained ...
Continue Reading

Ransomware-as-a-Service is Organizing, Becoming More Devastating and Costly

Take a look at the complex relationships that exist today between the ransomware gangs and the various services they utilize, and you quickly realize this is a very organized and ...
Continue Reading

The FBI’s Internet Crime Complaint Center Marks Its 6 Millionth Complaint as Pace Accelerates

The rate at which cyberattacks are increasing are being noticed by both their victims and the FBI, who are seeing more people affected by online crimes and scams.
Continue Reading

Credential Stuffing the Financial Services Sector

Credential stuffing in the financial services industry has risen significantly over the past year, according to Akamai’s latest State of the Internet / Security report. Credential ...
Continue Reading

When Cryptocurrency Investments Really Are Too Good To Be True

The US Federal Trade Commission (FTC) reports that victims have lost more than $80 million in cryptocurrency scams since October of last year, with about $2 million of that total going to ...
Continue Reading

Transparent Tribe Uses Spoofed Domains in Social Engineering Attacks

Researchers at Cisco Talos warn that the threat actor known as “Transparent Tribe” (also known as APT36 and Mythic Leopard) is using spoofed websites and malicious documents to deliver ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews