Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Chief Executive Officer & President

Stu Sjouwerman (pronounced “shower-man”) is the founder and CEO of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

Social Engineering Campaign against African Banks

A phishing campaign is targeting African banks with a technique called “HTML smuggling” to bypass security filters, according to threat researchers at HP.
Continue Reading

“Being Annoying” as a Social Engineering Approach

Attackers are spamming multifactor authentication (MFA) prompts in an attempt to irritate users into approving the login, Ars Technica reports. Both criminal and nation-state actors are ...
Continue Reading

Q1 2022 Report: Holiday-Themed Phishing Emails Entice Employees to Click [INFOGRAPHIC]

KnowBe4's latest quarterly report on top-clicked phishing email subjects is here. We analyze the top categories, general subjects (in both the United States and globally), and 'in the ...
Continue Reading

Small and Medium Businesses Account for Nearly Half of all Ransomware Victim Organizations

As ransomware costs increase, along with the effectiveness and use of extortions, smaller businesses are paying the price, according to new data from Webroot.
Continue Reading

One in Three U.K. Businesses Experience Cyber Attacks Weekly

New data from the U.K. Government’s Cyber Security Breaches Survey 2022 report shows that a material portion of businesses and charities are being attacked and feeling the repercussions.
Continue Reading

Meta Stops Three Cyber Espionage Groups Targeting Critical Industries

Impersonating legitimate companies and using a complex mix of fake personas across Facebook, Telegram, and other platforms, these groups used social engineering to gain network access.
Continue Reading

Smishing Scams Abuse Name of Legitimate Ukrainian Charity

Researchers at Trend Micro have spotted yet another scam taking advantage of the crisis in Ukraine by impersonating a legitimate charity. In this case, the scammers are posing as the ...
Continue Reading

CyberheistNews Vol 12 #15 [Heads Up] Hard-boiled Social Engineering by a Fake "Emergency Data Request"

CyberheistNews Vol 12 #15 | Apr. 12th., 2022 [Heads Up] Hard-boiled Social Engineering by a Fake "Emergency Data Request" Bloomberg has reported that forged "Emergency Data Requests" last ...
Continue Reading

Business Email Compromise (BEC): the Costliest Cybercrime

Organizations in the US lost $2.4 billion to business email compromise (BEC) scams (also known as CEO fraud) last year, according to Alan Suderman at Fortune.
Continue Reading

Microsoft Azure's Static Web Apps Service Becomes the New Home for Phishing Attacks

Taking advantage of the value of a legitimate web service, along with a valid SSL certificate, a new campaign of phishing attack targeting online Microsoft credentials is leveraging Azure.
Continue Reading

KnowBe4 Named a Leader in the Spring 2022 G2 Grid Report for Security Awareness Training

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) vendors based on user reviews, customer ...
Continue Reading

KnowBe4's PhishER Platform Named a Leader in the Spring 2022 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

We are excited to announce that KnowBe4 has been named a leader in the Spring 2022 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the fourth consecutive ...
Continue Reading

[On-Demand] The Ransomware Hostage Rescue Checklist: Your Step-by-Step Guide to Preventing and Surviving an Ransomware Attack

Skyrocketing attack rates, double and triple extortion, increasing ransom demands… cybercriminals are inflicting pain in every way imaginable when it comes to today’s ransomware attacks. ...
Continue Reading

Phishbait Invokes Russia's Ministry of Internal Affairs (Road Safety Division)

A phishing campaign impersonating WhatsApp has targeted more than 27,000 mailboxes, according to researchers at Armorblox. It’s not clear who the attackers were, but they used an old ...
Continue Reading

“Human Error” Ranked as the Top Cybersecurity Threat While Budgets Remain Misaligned

New insights into the state of data security show a clear focus on the weakest part of your security stance – your users – and organizations doing little to address it.
Continue Reading

Multi-Million Dollar Scam Call Center Shut Down by Multinational Police Efforts

Last month, Latvian and Lithuanian police – in conjunction with Europol – coordinated a raid on 3 call centers responsible for an international effort to defraud victims worldwide.
Continue Reading

Mailchimp Phishing Attack Results in Potential Hit on 100K Trezor Crypto Wallets

Stolen client data from Mailchimp put customers of the cryptocurrency hardware wallets on notice of potential social engineering attacks claiming to be Trezor.
Continue Reading

“Europol Calling” (Not Necessarily)

Scammers are impersonating Europol with fraudulent phone calls in an attempt to steal personal and financial information, according to Kristina Ohr at Avast. The German Federal Criminal ...
Continue Reading

Microsoft Warns of Lapsus$ “Targeting Organizations for Data Exfiltration and Destruction”

The group behind the recent attacks on Okta, NVIDIA, and Microsoft may be moving on to less-prominent organizations, using their data destruction extortion model on new victims.
Continue Reading

Info Stealer Malware Vidar Uses Microsoft Help Files to Launch Attacks

It appears that the use of Microsoft CHM files is gaining popularity, and from the way this latest attack works, it’s a rather ingenious and flexible method that could become more ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews