Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Chief Executive Officer & President

Stu Sjouwerman (pronounced “shower-man”) is the founder and CEO of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

[Heads Up] The Ukraine War Started A New Wiper Malware Spillover Risk

The war in Ukraine increases the risk of wiper malware to spill over. I'm sure you remember NotPetya, which caused billions of dollars of downtime damage. The WSJ reports that Symantec ...
Continue Reading

When the Phishers Want a Reply, not a Click

A sextortion phishing campaign is targeting French speakers accusing them of viewing child abuse content, according to Paul Ducklin at Naked Security. The emails purport to come from the ...
Continue Reading

CyberheistNews Vol 12 #08 [Eye Opener] Here Are the 4 Traits of Most Scams

CyberheistNews Vol 12 #08 | Feb. 22nd., 2022 [Eye Opener] Here Are the 4 Traits of Most Scams Written by Roger Grimes There are a lot of scams in the world, and they seem to be ...
Continue Reading

New Phishing Campaign Angles for Monzo Banking Customers

A phishing campaign is targeting users of the UK-based digital banking company Monzo, BleepingComputer reports. Security researcher William Thomas came across an SMS phishing (smishing) ...
Continue Reading

20 Year-Old “Right-to-Left Override” Functionality Used in Attacks to Trick Microsoft 365 Users Out of Credentials

Used to disguise malicious file extensions, this legacy functionality is being repurposed in attacks to obfuscate attachment types and steal credentials in an impressive way.
Continue Reading

New QBot Attack Only Takes 30 Minutes to Elevate Privileges and Steal Data

This banking trojan-turned-information-stealer has been around for nearly 15 years. But its latest iteration – seen even in the past few weeks – has stepped up in its’ ability to act ...
Continue Reading

Phishing Campaign Targets NFT Speculators

Scams follow fashion because money follows fashion. So it’s no surprise that non-fungible tokens (NFTs), which have become a hot speculative property, have drawn scam artists for phishing ...
Continue Reading

[Heads Up] There Is A Whole New Type of Blockchain Scam Called "Ice phishing"

In a post Wednesday last week, Microsoft issued a warning that they are seeing a brand new type of blockchain-centric attack aimed at web3 -- a term used to describe the decentralized ...
Continue Reading

Conti Ransomware Attacks Reap in $180 Million in 2021 as Average Ransomware Payments Rise by 34%

New analysis of ransomware attacks shows growth in the number of active strains, ransoms collected, and use of third-party services all adding up to a more organized and profitable ...
Continue Reading

Coinbase’s QR Code Superbowl Ad Only Helps Normalize QR-Based Scams

Use of QR codes is becoming a mainstream part of advertising, but also is getting the attention of scammers intent on redirecting you to a malicious site they control.
Continue Reading

Scammers Use a Mix of Stolen Credentials, Inbox Rules, and a Rogue Outlook Client Install to Phish Internal and External Victims

Organizations that are not using Microsoft’s multi-factor authentication are finding themselves victims of credential attacks that involve threat actors installing Outlook on a controlled ...
Continue Reading

Phishing Attacks on Social Media Doubled Over 2021

Phishing attacks on social media doubled over the course of 2021, according to a new report from PhishLabs by HelpSystems. Most (68%) of these attacks targeted organizations in the ...
Continue Reading

CyberheistNews Vol 12 #07 [Heads Up] FBI Warns Against New Criminal QR Code Scams

[Heads Up] FBI Warns Against New Criminal QR Code Scams Email not displaying? | View Knowbe4 Blog CyberheistNews Vol 12 #07 | Feb. 15th., 2022 [Heads Up] FBI Warns Against New Criminal QR ...
Continue Reading

[On-Demand Webinar] Incredible Email Hacks You'd Never Expect and How You Can Stop Them

If you think the only way your network and devices can be compromised via email is phishing, think again!
Continue Reading

Meta Files Lawsuit Over Phishing Attacks

Meta (Facebook’s corporate parent) and the digital banking company Chime have filed a joint lawsuit against two Nigerian citizens for allegedly impersonating Chime in phishing attacks, ...
Continue Reading

FBI: Scammers Exploit Job Posting Sites with Fake Jobs to Steal Money and Personal Information

In the wake of the great reset, cybercriminals are finding success posing as legitimate companies in job postings seeking new hires on well-known job sites.
Continue Reading

New Cyberattack Campaign Delivers Multiple RATs via Trusted Cloud Services

Abusing cloud providers including Microsoft Azure and AWS, cybercriminals are setting up malicious infrastructure to hide their operations and avoid detection.
Continue Reading

Brand Impersonation and the Healthcare Sector

The healthcare sector is particularly vulnerable to phishing attacks, according to Mike Azzara at Mimecast. Employees in the healthcare industry need to be wary of brand impersonation ...
Continue Reading

Updated Ransomware Hostage Rescue Manual

Ransomware is one of the most damaging types of cyber attacks of all time, and the one feared the most by business owners and cybersecurity defenders. This worry is not without reason. In ...
Continue Reading

Use of Excel .XLL Add-Ins Soars Nearly 600% to Infect Systems in Phishing Attacks

Cybercriminals are taking to more advanced functionality than traditional VBA scripting to both execute complex malicious actions via Excel and to obfuscate their true intention - ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews