Money Mules: How A Data Breach Turns Into Cash
Cybercriminals don’t want to be caught, so after a data breach, they use unsuspecting people as “mules” to launder money using a sophisticated shipping scam.
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
Cybercriminals don’t want to be caught, so after a data breach, they use unsuspecting people as “mules” to launder money using a sophisticated shipping scam.
Our friends at Malwarebytes reported that a malware strain similar in nature to Stuxnet—but more aggressive and sophisticated—allegedly hit the infrastructure and strategic networks in ...
What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about ...
Pretexting attacks are a growing threat to organizations, warn Chris Tappin and Simon Ezard from the Verizon Threat Research Advisory Centre. Verizon’s 2018 Digital Breach Investigation ...
A phishing scam is using fake login pages to target League of Legends players, according to Avast Blog. At the moment, the attacks are taking place primarily in western Europe, mainly ...
Howard, KnowBe4's HackBusters Discussion Forum Moderator reported on this very interesting phone call he got:
According to a new survey, social media sharing – and oversharing – provides cybercriminals with important personal details to commit identity theft, fraud, and more.
Check out the content and feature updates in the KnowBe4 platform for the month of October!
The recent rash of cryptocurrency scams on Twitter show organizations that social media is there to share posts and can’t protect platform users.
Just a shot of almost 600 people in costume !!!
The Tesla founder’s recent tweet about cryptocurrency got him temporarily locked out of his Twitter account, demonstrating the seriousness of the scam.
With Microsoft’s latest release of Windows Defender running in a virtual sandbox (the first of its kind), it may be time to focus your energies – and budget – on other parts of your ...
Ignorance of security policies and security threats is one of the primary reasons why employees break cybersecurity rules, says Ericka Chickowski at Dark Reading. A study conducted by ...
Attacks leveraging look-alike federated logon pages are more dangerous than malware-laden attachments in email.
FireEye thinks it found the evil genius behind a nasty cyber-infection at a Saudi Oil refinery.
Should you find yourself in the situation where paying the ransom is your only out, it’s important to know how to navigate – and minimize – the payment. Cyber attacks are the new reality ...
The latest results of KnowBe4's quarterly top-clicked phishing email subjects is now available. We report on three different categories: general emails, social media related subjects, and ...
New data from the 2018 Chubb Cyber Risk Survey shows people and companies have a false sense of cybersecurity and aren’t really doing much about it.