Phishing and pretexting represent 93% of social attack-based breaches
A good article in Forbes that takes another dive into the new 2018 Verizon Data Breach Investigations Report.
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
A good article in Forbes that takes another dive into the new 2018 Verizon Data Breach Investigations Report.
KnowBe4 was rated highest in Cybersecurity Training & Education Solutions by survey respondents for the second consecutive year. TAMPA, Fla., May 14, 2018 /PRNewswire/ -- Black Book ...
It's KnowBe4's general policy to not mix business with politics or religion. However, sometimes geopolitics—which focuses on political power in relation to geographic space—is the only ...
Phishers have found a way of moving the malicious URLs in their emails past Office 365's protections. The security company Avanan says they've observed criminals using a tag in the HTML ...
Bleepingcomputer reported: "Ransomware has infected the servers of the Riverside Fire and Police department for the second time in a month. The first ransomware infection took place on ...
Gmail's new confidential mode lets its users create "expiration dates" for emails, or require recipients to provide an SMS passcode. (And Google also claims they've removed the option to ...
Rosie Murray West at the Financial Times reported: "Taxpayers are being targeted by a new wave of phishing scams linked to the financial calendar, HM Revenue & Customs has warned. ...
The word "phishing" can't be found in Chaucer or Shakespeare. It is a homophone of "fishing". But why "ph" instead of "f"? Many English words of Greek origin transliterate "φ" (phi) as ...
On May 7, executives of Equifax submitted a "statement for the record" to the Securities and Exchange Commission detailing the extent of the consumer data breach the company first ...
KnowBe4 is proud to announce support for delegated permissions as part of the Security Roles feature. Security Roles allows you to limit roles to only display specific data or allow for ...
Our friend Larry Abrams at Bleepingcomputer said: "I am trying something new where I will post in brief articles about new ransomware as they are released. Many of these ransomware ...
OK, here is something really scary. KnowBe4's Chief Hacking Officer Kevin Mitnick now and then calls me with some chilling news. This time, Kuba Gretzky, a white hat hacker friend of ...
Attackers know that companies are sending a lot of emails to customers about GDPR—and that makes them prime opportunity for phishing attacks. With the looming GDPR May 25 deadline almost ...
This is the second year we've published quarterly results of the most-clicked phishing email subjects across a few categories. We separate the data into subjects related to social media ...
Catalin Cimpanu at Bleepingcomputer reported: "Chinese cyber spies are evolving their tactics, focusing on IT staffers, relying more and more on spear phishing instead of malware, and ...
According to Trend Micro researchers a new ransomware strain called Blackheart drops its payload alongside the perfectly legitimate AnyDesk remote desktop tool, highly likely as a way to ...
The most common infection vectors are still email phishing and drive-by downloads according to the latest threat report from AI security specialist Cylance. The report provides a ...
Troy Hunt, the founder of Haveibeenpwned came out with some brand new numbers that show there's bad news and there's more bad news. A few months ago he launched V2 of his Pwned Passwords ...
"A school district located in Massachusetts paid attackers $10,000 after they infected its computer network with crypto-ransomware. Officials at Leominster Public Schools decided to meet ...
Daniel R. Stoller at Bloomberg Law had an excellent observation about the risks of phishing related to general crime policies. Here is a short excerpt and the whole article is warmly ...