Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Founder and Executive Chairman

Stu Sjouwerman (pronounced “shower-man”) is the Founder and Executive Chairman of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

Your KnowBe4 Fresh Content Updates from April 2023

Check out the 19 new pieces of training content added in April, alongside the always fresh content update highlights, events and new features.

Heart of the Matter: How LLMs Can Show Political Bias in Their Outputs

Wired just published an interesting story about political bias that can show up in LLM's due to their training. It is becoming clear that training an LLM to exhibit a certain bias is ...

[Eyes Wide Shut] Fed Powell's Call with Russian Pranksters Exposed as Social Engineering

It was all over the news. Fed's Jerome Powell was social engineered by Russian pranksters posing as Zelensky.

[Live Demo] Customizing Your Compliance Training to Increase Effectiveness

Linking compliance training to specific outcomes is hard. Compliance training has a reputation for being challenging for organizations to offer, difficult to do right and employees are ...

Does ChatGPT Have Cybersecurity Tells?

Poker players and other human lie detectors look for “tells,” that is, a sign by which someone might unwittingly or involuntarily reveal what they know, or what they intend to do. A ...

Latest QBot Attacks Use a Mixture of PDF Attachments and Windows Scripting Host Files to Infect Victims

QBot malware seems to be outliving its competitors through innovative new ways to socially engineer victims into helping install it.

Scammers Impersonate Zelle via the Lure of “Getting Paid” to Get Paid Themselves

A new impersonation scam targets users of the popular pay platform under the guise of the victim having money coming to them and with the goal to obtain Zelle credentials.

Despite a Majority of Organizations Believing They’re Prepared for Cyber Attacks, Half Were Still Victims

A new survey points to an overconfidence around organization’s preparedness, despite admitting to falling victim to ransomware attacks – in some cases multiple times.

Organizations Have No Idea of a Data Breach’s Root Cause in 42% of Reported Cases

New data shows how poorly organizations are at identifying – let alone removing – an attacker's foothold, putting themselves at continued risk of further attacks and data breaches.

Recruiting Money Mules

Money mules play a subordinate but important role in the criminal economy. They’re used to move stolen funds around, a low-level version of illicit remittance and money laundering. ...

Fake Meta Tech Support Profiles for Fraud

Researchers at Group-IB have found an extensive campaign in which criminal operators have created a large number of fake Facebook profiles that repost messages in which the scammers ...

CyberheistNews Vol 13 #17 [Head Start] Effective Methods How To Teach Social Engineering to an AI

CyberheistNews Vol 13 #17 | April 25th, 2023 [Head Start] Effective Methods How To Teach Social Engineering to an AI Remember The Sims? Well Stanford created a small virtual world with 25 ...

Another Perspective on ChatGPT's Social Engineering Potential

We’ve had occasion to write about ChatGPT’s potential for malign use in social engineering, both in the generation of phishbait at scale and as a topical theme that can appear in lures. ...

FBI Warns of Sextortion Scams that Yield a New Equally Scam-Like Service: Sextortion Assistance

A FBI bulletin highlights a new twist in the sextortion game: companies claiming to assist with addressing sextortion who use deceptive social engineering tactics to coerce victims into ...

Phishing for Credentials in Social Media-Based Platform Linktree

Social media is designed of course to connect, but legitimate modes of doing so can be abused. One such case of abuse that’s currently running involves Linktree, a kind of meta-medium for ...

More Companies with Cyber Insurance Are Hit by Ransomware Than Those Without

In an interesting twist, new data hints that organizations with cyber insurance may be relying on it too much, instead of shoring up security to ensure attacks never succeed.

OpenAI Transparency Report Highlights How GPT-4 Can be Used to Aid Both Sides of the Cybersecurity Battle

The nature of an advanced artificial intelligence (AI) engine such as ChatGPT provides its users with an ability to use and misuse, potentially empowering both security teams and threat ...

Nearly One-Half of IT Pros are Told to Keep Quiet About Security Breaches

At a time when cyber attacks are achieving success in varying degrees and IT pros are keeping quiet about resulting breaches, there is one specific type of attack that has them most ...

Phishing Email Volume Doubles in Q1 as the use of Malware in Attacks Slightly Declines

New data shows that cybercriminals started this year off with a massive effort using new techniques and increased levels of attack sophistication.

Guarding Against AI-Enabled Social Engineering: Lessons from a Data Scientist's Experiment

The Verge came out with an article that got my attention. As artificial intelligence continues to advance at an unprecedented pace, the potential for its misuse in the realm of ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.