Cyber Attacks Mean Double the Trouble in 2018
According to the 2018 Traveler’s Risk Index, the percentage of businesses that have been the victim of a cyberattack has doubled… and most businesses aren’t even remotely ready.
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
According to the 2018 Traveler’s Risk Index, the percentage of businesses that have been the victim of a cyberattack has doubled… and most businesses aren’t even remotely ready.
Phone scams are becoming more convincing as attackers devise new ways to sound legitimate. KrebsOnSecurity recently spoke with several readers who'd been targeted by voice phishing, or ...
We are excited to announce the availability of two new features, Virtual Risk Officer and Advanced Reporting.
October 4th, 2018. Announced by the UK National Cyber Security Centre (NCSC), the UK and its allies exposed a ransomware campaign by the GRU, the Russian military intelligence service, of ...
Do your users know what to do when they receive a suspicious email? Should they call the help desk, or forward it? Should they forward to IT including all headers? Delete and not report ...
Over the last few months, Kevin has been talking about this possibility: embedding malicious code in cables. This is a brand new demo where he shows this is now technically feasible! See ...
Check out the new features and training content in the KnowBe4 platform for September! So how much security awareness training content do you have access to with a Diamond subscription? ...
I'm excited to announce our incredible year-over-year sales increase, nearly doubling 2017's third quarter sales in this third quarter of 2018, breaking records with new corporate ...
The latest data from SecurityScorecard shows the retail industry’s security stance is at an all-time low, and is particularly susceptible to social engineering attacks. The retail ...
TL,DR: A recent phishing attack posing as a PDF decoy from a Denver law firm was stealing clients' Office 365 credentials. The phishing bait was hosted in Azure blob storage and contained ...
Despite the presence of application and OS vulnerabilities – both new and old – hackers prefer to leverage social engineering as their preferred attack method.
With so many security strategies revolving around the detection of malware, organizations forget the primary source of all their worries – phishing.
This thing is a nightmare that escaped into daylight. The Russian GRU—aka Fancy Bear—probably was riveted reading the Wikileaks CIA Vault 7 UEFI Rootkit docs (PDF) and built one of these ...
It was all over the news, and CNBC interviewed KnowBe4's very own Chief Hacking Officer Kevin Mitnick (note the StreetCred box on the right).
To start your National Cyber Security Awareness Month (NCSAM) here is a goodie for your users to kick things off.
Spam campaigns are all but dead. But lucrative targeted low-risk, high-yield cyber-attacks have risen to take their place, according to the European Union law enforcement agency Europol.
The operation run by botnet author Peter Levashov demonstrates how easy it is for would-be criminals to get into the business.
This is common wisdom, but it bears repeating, because common wisdom is easily overlooked. People are often called an organization's greatest asset. They're also its greatest ...
As the holiday season approaches, cybercriminals are set to scam your users out of their personal money but also your organizational budget.