New Report Shows the Success of Business Email Compromise Come from a Calculated Attack Approach
The newest data from security vendor Barracuda provides insight into exactly how attackers execute BEC attacks and what makes them so successful.
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
The newest data from security vendor Barracuda provides insight into exactly how attackers execute BEC attacks and what makes them so successful.
In a business environment, employees use Google Translate on a regular basis to get access to documents they need to work with, or websites that are in another language.
This new type of attack focuses on threatening to steal and publish data on the web, asking for a ransom to be paid to keep the attackers from doing so.
If experiencing a single cyberattack isn’t enough, this complex attack that shifted mid-stream demonstrates how attackers take advantage of victim details as an attack unfolds.
The FBI is warning U.S. companies about a series of recent ransomware attacks in which the perpetrator, sometimes posing as a government agency, steals data and then encrypts it to ...
In the fourth quarter of 2019, KnowBe4 reached 54% growth over Q4 2018, increasing customer accounts to well over 30,000.
As organizations look to improving their defenses, it’s worth remembering that attackers usually get through those defenses by manipulating the human beings those security measures are in ...
BeckerHospitalReview just posted a new wrinkle in the battle against ransomware: "Four patients filed a class action lawsuit against Tuscaloosa, Ala.-based DCH Health System, alleging ...
We have had occasion to warn of this before, but as 2020 begins and April 15th approaches, it may be worth another mention. The US Internal Revenue Service wants taxpayers to keep a sharp ...
With data breaches hitting headlines daily, IT pros are constantly concerned about the next big threat. Whether it’s ransomware, phishing, or completely new attack vectors, there’s always ...
In support of upcoming changes to data privacy laws we are making a few updates to our privacy policy. We have added language to help provide our customers clarity on KnowBe4’s ...
Major Dutch Maastricht University was still trying to recover from a crippling cyber attack nearly a week after the university's computer systems were infected by ransomware. New ...
Among the ransomware that caused so much disruption in the latter half of 2019 was the strain known as Ryuk, and Ryuk has typically been spread by phishing. According to ZDNet, a recent ...
LAW.COM had a very good reminder that you really need to keep in mind. Here is an extract: "With just days to go before the California Consumer Privacy Act (CCPA) compliance date, some ...
The chief executive officer of a telemarketing company in Sherwood, Arkansas has let go 300 employees after the company failed to recover from a ransomware infection a few months back.
Researchers at ESET have come across phishing sites that try to steal PayPal logins along with a wide range of personal and financial information. The scam begins with phishing emails ...
Veterans are particularly valuable targets for various types of social engineering attacks, according to Mary K. Talbot at the Providence Journal. Veterans are often respected leaders in ...
Excellent article in WIRED, where they observed that In the last few years, the "Nigerian prince" scams have gotten a major upgrade. Here is an extract and a link to the full article:
The FBI has issued a warning to private industry recipients to provide information and guidance on the LockerGoga and MegaCortex Ransomware.