Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Chief Executive Officer & President

Stu Sjouwerman (pronounced “shower-man”) is the founder and CEO of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

Interest in Infostealer Malware Within Cyberattacks Spikes as MFA Fatigue Attacks Increase

New analysis of dark web forums shows an increase in discussions around the use of infostealer malware as part of both the first attack within a campaign or as part of an initial access ...
Continue Reading

October and November Have Been the Two Busiest Months for Ransomware

Trending data going back to January of 2020 shows that ransomware attacks are continually increasing in number with unusual highs in the 4th quarter.
Continue Reading

Utility Bill is the New Phishbait for Cybercriminals

An SMS phishing (smishing) campaign is impersonating utility providers in the US, Cybernews reports. Researchers at Enea AdaptiveMobile Security spotted the campaign, which informs ...
Continue Reading

Ughh. FBI’s Vetted Threat Sharing Network ‘InfraGard’ Hacked

Investigative reporter Brian Krebs reported December 13, 2022 that "InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI) to build cyber and physical threat ...
Continue Reading

[CASE STUDY] New-school Approach to Training and Simulated Phishing Shines Over Traditional LMS

A U.S.-based enterprise manufacturing organization cut their Phish-prone Percentage™ (PPP) by more than 80% after five months using the KnowBe4 security awareness training and simulated ...
Continue Reading

[EYE OPENER] How ChatGPT Can Be Used For Social Engineering

ChatGPT could give Google a serious run for its money. We are not quite there yet, but the capabilities are rapidly improving. Just have a look at the command I gave it. In 5 seconds the ...
Continue Reading

Incident Response Actions are Systematically Reversed by Hackers to Maintain Persistence

Analysis of attacks on two cellular carriers have resulted in the identification of threat actions designed to undo mitigations taken by security teams mid-attack.
Continue Reading

New Modular Attack Chain Found That Allows Attackers to Change Payloads Mid-Breach

We’ve long known developers of cyberattacks to be crafty and focus a lot of energy on obfuscation, but a new attack can shift gears midstream, delivering just the right malware.
Continue Reading

Scammer Group Uses Business Email Compromise to Impersonate European Investment Portals

A sophisticated scammer group has stolen at least €480 million from victims in France, Belgium, and Luxembourg since 2018, according to researchers at Group-IB. The gang uses a highly ...
Continue Reading

[Eye Opener] Cybersecurity Resilience Emerges as Top Priority as 62% of Companies Say Security Incidents Impacted Business Operations

Cisco's annual Security Outcomes Report shows executive support for a security culture is growing. The report identifies the top seven success factors that boost enterprise security ...
Continue Reading

Cyber Insurers Focus on Catastrophic Attacks and Required Minimum Defenses as Premiums Double

Recent attacks are helping cyber insurers better understand what security strategies need to be in place and how to price policies based on the risk those policies cover.
Continue Reading

Archives Overtake Office Documents as the Most Popular File Type to Deliver Malware

Taking the lead over the use of Word, Excel, PDF, and other office-type documents in attacks, new data shows that files like ZIP and RAR have grown in popularity by 11% last quarter.
Continue Reading

[On-Demand] Ransomware, Ransom-war and Ran-some-where: What We Can Learn When the Hackers Get Hacked

Ransomware strikes organizations almost every two seconds. Tales of bad actors doing their worst fill the InfoSec news cycle, but what happens when the hackers get hacked?
Continue Reading

Russian Threat Actor Impersonates Aerospace and Defense Companies

A Russia-linked threat actor tracked as TAG-53 is running phishing campaigns impersonating various defense, aerospace, and logistic companies, according to The Record by Recorded Future. ...
Continue Reading

CyberheistNews Vol 12 #49 [Keep An Eye Out] Beware of New Holiday Gift Card Scams

CyberheistNews Vol 12 #49 | December 6th, 2022 [Keep An Eye Out] Beware of New Holiday Gift Card Scams By Roger A. Grimes Every holiday season brings on an increase in gift card scams. ...
Continue Reading

Credential Phishing with Apple Gift Card Lures

A phishing campaign is impersonating Apple and informing the user that their Apple account has been suspended due to an invalid payment method, according to researchers at Armorblox.
Continue Reading

Inside NATO’s Efforts To Plan For A Future Cyberwar

Maggie Miller at Politico had the scoop: "TALLINN, Estonia — Some 150 NATO cybersecurity experts assembled in an unimposing beige building in the heart of Estonia’s snow-covered capital ...
Continue Reading

New Threat Group Already Evolves Delivery Tactics to Include Google Ads

Delivering an equally new Royal ransomware, this threat group monitored by Microsoft Security Threat Intelligence has already shown signs of impressive innovation to trick victims.
Continue Reading

Latest Netflix-Impersonated Phishing Attacks Surge in Frequency by 78% Since October

Using a mix of invisible and lookalike characters, this phishing attack attempts to get past security scanners by obfuscating both email content and domain names.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews