Cybercrime Takes Advantage of Agile Development
The bad guys have long benefited from vulnerabilities in any part of an OS or application. Now they’re going a bit deeper and looking for ways to benefit from development cycles.
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
The bad guys have long benefited from vulnerabilities in any part of an OS or application. Now they’re going a bit deeper and looking for ways to benefit from development cycles.
The FBI received a report from the US Democratic National Committee (DNC) that unknown actors sought access to a voter database through a phishing campaign.
Where do you see your organization in five years? According to Juniper Research, without a solid security strategy, you may be one of the many experiencing a data breach.
160+ Interactive Training Modules across 29 different languages 150+ Video Modules across 20 different languages
Organizations aren’t the only ones tired of data breaches. A class-action lawsuit against health insurer Anthem for their 2015 data breach comes with a hefty approved settlement. If ...
The GRU, the Russian military intelligence spy agency which was responsible for the 2016 election cyber attacks, is at it again and are now targeting the U.S. Senate and conservative ...
KnowBe4 has partnered with Twist & Shout, makers of entertaining films for businesses, on their Restricted Intelligence show. The videos cover a wide range of social engineering ...
The KnowBe4 Hackbuster’s Forum is an online community dedicated to stopping the bad guys that use social engineering to hack your organization.
Michael Fisher shared this on Twitter. Very nice and gives an immediate overview of #CyberSecurity Defense-in-Depth with all the areas it encompasses. Here it is:
Online, e-commerce and mobile fraud are on the rise, according to RSA, with 41% of successful attacks enabled by phishing scams.
Today, we celebrated two milestones in-one:
The attack dubbed “PhishPoint” by Cloud Security vendor Avanan demonstrates the craftiness and extent cybercriminals will go to in order to harvest Office 365 credentials.
The need for improved detection, response and privacy is driving the demand for security products and services in response to security risks, business needs and industry changes, Gartner ...
With such an abundance of information around attack methods, vulnerabilities, and potential targets, you would think IT has a handle on cybersecurity. Accenture shows us they don’t.
In this rare event, Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, along with Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, will ...
It’s not good to be in Healthcare IT these days, judging by the latest data. With over 3 million records put at risk by both insiders and external attacks in Q2, healthcare orgs need to ...
Like legitimate call centers, tech support divisions, and organizations with inbound calling, scammers are using call optimization to improve callback success rates in tech support scams.