Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Chief Executive Officer & President

Stu Sjouwerman (pronounced “shower-man”) is the founder and CEO of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

Ransomware Gang Creates “User-Friendly” Stolen Data Search Site for Employee Victims

In an interesting extortion twist to get ransomware victims to pay up, one gang has created a search site to allow employees to see if their own private information has been made public.
Continue Reading

Phishing Emails Top the List as the Initial Attack Vector for Ransomware Attacks

The latest data on ransomware trends from backup vendor Veeam demonstrate the impact these attacks have on backups and an organization’s ability to recover.
Continue Reading

Email-Based Threats Double as Malware, Credential Phishing, and BEC Detections Increase

Newly released data from TrendMicro about high-risk email threats in 2021 shows where cybercriminals are placing their focus and where yours should be as well.
Continue Reading

[FREE Resource Kit] July Is Ransomware Awareness Month

July is Ransomware Awareness Month, and we’ve got you covered with free resources!
Continue Reading

New Phishing Campaign Impersonates Canada Revenue Agency

A phishing campaign is impersonating the Canada Revenue Agency (CRA) in an attempt to steal Canadians’ personal information, according to Rene Holt at ESET. The phishing emails inform ...
Continue Reading

[New FBI and CISA Alert] This ransomware strain uses RDP flaws to hack into your network

As of May 2022, MedusaLocker has been observed predominantly exploiting vulnerable Remote Desktop Protocol (RDP) configurations to access victims' networks, according to a new joint ...
Continue Reading

[Heads Up] Online Fraud Now Sky-high With 'Tinder Swindler' Romance Scams Costing Hundreds of Millions

A new article in Bloomberg focused on new sky-high online fraud numbers, they are horrendous. Here is a short summary and I recommend you read the whole article.
Continue Reading

Wars and Lechery, Nothing Else Holds Fashion for Phishing Attacks

Shakespeare said it first, and things haven’t changed: suffering and desire continue to drive victims to the social engineers. Researchers at Bitdefender have observed a phishing campaign ...
Continue Reading

Bad News to Ransom Payers: 80% of You Will Face a Second Attack Within 30 Days

New insight into what happens during and after a ransomware attack paints a rather dismal picture of what to expect from attackers, your executives, and your operations.
Continue Reading

80% of Organizations Await “Inevitable” Negative Consequences From Email-Born Cyberattacks

With nearly every organization experiencing some form of phishing attack, new data suggests these attacks are improving in sophistication, effectiveness, and impact.
Continue Reading

New Evasive Phishing Techniques Help Cybercriminals Launch “Untraceable” Campaigns

Scary new details emerge of cybercriminals using reverse tunneling and URL shorteners to evade detection by security solutions, allowing them to take victims for their credentials and ...
Continue Reading

FBI Warns of Deepfakes Used to Apply for Remote Jobs

If you're looking for your company's next remote IT position, you may want to think twice before doing so. The FBI recently reported to the Internet Complaint Center today that there are ...
Continue Reading

MetaMask Crypto Wallet Phishing

A phishing campaign is attempting to steal credentials for MetaMask cryptocurrency wallets, according to Lauryn Cash at Armorblox.
Continue Reading

Pre-Hijacking of Online Accounts are the Latest Method for Attackers to Impersonate and Target

Rather than run a complex credential harvesting phishing scam, attackers use existing information about their victim and hijack a popular web service account *before* it’s created.
Continue Reading

“Failure to Authenticate” Wire Transaction at the Heart of a Cyber Insurance Appeal Case

Lawsuits over denied cyber insurance claims provide insight into what you should and shouldn’t expect from your policy – and that actions by your own users may make the difference.
Continue Reading

Phishing Scammers Leverage Telegraph’s Loose Governance to Host Crypto and Credential Scams

The free and unmonitored webpage publishing platform has been identified as being used in phishing scams dating back as early as mid-2019, as a key part to bypass security solutions.
Continue Reading

Vendor Impersonation Competing with CEO Fraud

Researchers at Abnormal Security have observed an increase in vendor impersonation in business email compromise (BEC) attacks.
Continue Reading

[Heads Up]  Russia has increased the cyber attacks against countries that help Ukraine

The Wall Street Journal just reported that Russian intelligence agencies have increased the pace of cyberattacks against nations that have provided aid to Ukraine, according to new ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews