Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Chief Executive Officer & President

Stu Sjouwerman (pronounced “shower-man”) is the founder and CEO of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

CyberheistNews Vol 5 #24 Scam Of The Week: Resume Ransomware & The Truth About The OPMgate Hack

CyberheistNews Vol 5 #24 June 16, 2015 Scam Of The Week: Resume Ransomware The SANS InfoSec Forums noted that since Monday May 25th new CryptoWall 3.0 ransomware attacks started, using ...
Continue Reading

Gone phishing: How I taught my users to stop clicking everything

Familiar with SpiceWorks? It's the world's largest IT Admin community. One user wrote the 392nd entry in their Spotlight on IT. This is the story. There is a link at the end to the ...
Continue Reading

The Truth About The Massive OPMgate Hacking Scandal

The recent U.S. Government Office of Personnel Management hack is getting worse by the day. In Saturday's Wall Street Journal they revealed that apart from more than 4 million personal ...
Continue Reading

Annoying New Ransomware Attack Uses Girl Resumes

The SANS InfoSec Forums noted that since Monday May 25th a new version of CryptoWall 3.0 ransomware started, using both malicious spam and the Angler exploit kit (EK). The attack wave has ...
Continue Reading

CyberheistNews Vol 5 #23 How The NSA Killed Internet Security in 1978 & Scam Of The Week

CyberheistNews Vol 5 #23 June 9, 2015 How The NSA Killed Internet Security in 1978 & Scam Of The Week Need to get ammo for your IT security budget, but the people holding the purse ...
Continue Reading

Ransomware Victim Gets Discount From Cybercriminal

Researchers at Check Point discovered a new Russian ransomware strain that allows the victim to communicate with the cybercriminals who are open to providing discounts to decrypt the ...
Continue Reading

How The NSA Killed Internet Security in 1978

Here is a very short summary of Internet security which explains why the current version of the Internet is not secure. It was not built securely from day one because the NSA objected to ...
Continue Reading

Scam Of The Week: "Your Data Was Hacked, How To Protect Yourself"

It is all over the news, The 4-million Federal Employee OPM database was hacked and lots of employee information leaked to probably the Chinese. This weekend on CNN they said that the ...
Continue Reading

CyberheistNews Vol 5 #22 ALERT: Is Your Network Infected With A Sleeper Ransomware Strain?

CyberheistNews Vol 5 #22 June 2, 2015 ALERT: Is Your Network Infected With A Sleeper Ransomware Strain? There is a concerning new "sleeper" ransomware twist. It's called Locker and has ...
Continue Reading

Are there free ransomware decryption tools?

JP Buntix wrote: "Two types of ransomware making headlines all across the world in recent months are called CryptoLocker and CoinVault. Both types of ransomware operate in the same way, ...
Continue Reading

Some Interesting Security Awareness Computer-Based Training Numbers

You may know Gartner, the 800-pound gorilla in the IT Analyst space. When a market is mature enough they create their so-called Magic Quadrant (MQ) with the leading vendors in that ...
Continue Reading

It's heeere! Criminal Ransomware as a Service

As we predicted in our whitepaper "Your Money or Your Life/Files", there is now shake-and-bake criminal ransomware that aspiring Internet criminals can put together in a few minutes. Meet ...
Continue Reading

The Information Security Policy Trap

InfoSec genius Ben Tomhave wrote: "It's that time of year again: time to update the policies! This annual exercise is always a source of great enjoyment for me (no, not really). After ...
Continue Reading

Is Your Network Infected With Sleeper Ransomware?

This is a concerning new "sleeper" ransomware twist.
Continue Reading

Will Your Contractors Take Down Your Business?

Will Your Contractors Take Down Your Business? Do you know how well your vendors, business associates, contracted third parties (who I will collectively call “contractors”) are protecting ...
Continue Reading

CyberheistNews Vol 5 #20 Adult Friend Finder Hack Is Nightmare Phishing Problem

Adult Friend Finder Hack Is Nightmare Phishing Problem Guys, we have a real phishing problem with this Adult Friend Finder (AFF) hack. This particular adult site is one of the most ...
Continue Reading

Adult Friend Finder Hack Is Nightmare Phishing Problem

Guys, we have a real phishing problem with this Adult Friend Finder (AFF) hack. This particular adult site is one of the most heavily-trafficked websites in the U.S. and has 40 million ...
Continue Reading

Researchers Observe SVG Files Being Used To Distribute Ransomware

Researchers with AppRiver have observed attackers sending out phishing emails with SVG files attached – these files, when downloaded and executed, open up websites that download what ...
Continue Reading

CyberheistNews Vol 5 #19 Scam Of The Week: Red Bull Money Mule Victims

Scam Of The Week: Red Bull Money Mule Victims Warn your employees, friends and family about a cunning money laundering scam that is currently back on the rise. This lure was first used ...
Continue Reading

This Week's Five Most Popular HackBusters Posts 5/17/2015

What are IT security people talking about? Here are this week's five most popular hackbusters posts: 1) Feds Say That Banned Researcher Commandeered a Plane: ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews