Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Founder and Executive Chairman

Stu Sjouwerman (pronounced “shower-man”) is the Founder and Executive Chairman of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

CyberheistNews Vol 12 #15 [Heads Up] Hard-boiled Social Engineering by a Fake "Emergency Data Request"

CyberheistNews Vol 12 #15 | Apr. 12th., 2022 [Heads Up] Hard-boiled Social Engineering by a Fake "Emergency Data Request" Bloomberg has reported that forged "Emergency Data Requests" last ...

Business Email Compromise (BEC): the Costliest Cybercrime

Organizations in the US lost $2.4 billion to business email compromise (BEC) scams (also known as CEO fraud) last year, according to Alan Suderman at Fortune.

Microsoft Azure's Static Web Apps Service Becomes the New Home for Phishing Attacks

Taking advantage of the value of a legitimate web service, along with a valid SSL certificate, a new campaign of phishing attack targeting online Microsoft credentials is leveraging Azure.

KnowBe4 Named a Leader in the Spring 2022 G2 Grid Report for Security Awareness Training

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) vendors based on user reviews, customer ...

KnowBe4's PhishER Platform Named a Leader in the Spring 2022 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

We are excited to announce that KnowBe4 has been named a leader in the Spring 2022 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the fourth consecutive ...

[On-Demand] The Ransomware Hostage Rescue Checklist: Your Step-by-Step Guide to Preventing and Surviving an Ransomware Attack

Skyrocketing attack rates, double and triple extortion, increasing ransom demands… cybercriminals are inflicting pain in every way imaginable when it comes to today’s ransomware attacks. ...

Phishbait Invokes Russia's Ministry of Internal Affairs (Road Safety Division)

A phishing campaign impersonating WhatsApp has targeted more than 27,000 mailboxes, according to researchers at Armorblox. It’s not clear who the attackers were, but they used an old ...

“Human Error” Ranked as the Top Cybersecurity Threat While Budgets Remain Misaligned

New insights into the state of data security show a clear focus on the weakest part of your security stance – your users – and organizations doing little to address it.

Multi-Million Dollar Scam Call Center Shut Down by Multinational Police Efforts

Last month, Latvian and Lithuanian police – in conjunction with Europol – coordinated a raid on 3 call centers responsible for an international effort to defraud victims worldwide.

Mailchimp Phishing Attack Results in Potential Hit on 100K Trezor Crypto Wallets

Stolen client data from Mailchimp put customers of the cryptocurrency hardware wallets on notice of potential social engineering attacks claiming to be Trezor.

“Europol Calling” (Not Necessarily)

Scammers are impersonating Europol with fraudulent phone calls in an attempt to steal personal and financial information, according to Kristina Ohr at Avast. The German Federal Criminal ...

Microsoft Warns of Lapsus$ “Targeting Organizations for Data Exfiltration and Destruction”

The group behind the recent attacks on Okta, NVIDIA, and Microsoft may be moving on to less-prominent organizations, using their data destruction extortion model on new victims.

Info Stealer Malware Vidar Uses Microsoft Help Files to Launch Attacks

It appears that the use of Microsoft CHM files is gaining popularity, and from the way this latest attack works, it’s a rather ingenious and flexible method that could become more ...

Ransomware Victims See Ransom Demands and Payments Increase as The Number of Published Data Victims Spikes

Cybercriminals Groups and “as a Service” threat actor affiliates alike seem to be doing well, according to a new report on the state of ransomware from Palo Alto Networks’ Unit42.

Social Engineering from Tehran

Social engineering continues to be a core component of the Iranian government’s hacking operations, according to researchers at Recorded Future.

CyberheistNews Vol 12 #14 [EYE OPENER] A Lack of Employee Cyber Hygiene is the Next Big Threat

[EYE OPENER] A Lack of Employee Cyber Hygiene is the Next Big Threat Email not displaying? | View Knowbe4 Blog CyberheistNews Vol 12 #14 | Apr. 5th., 2022 [EYE OPENER] A Lack of Employee ...

Social Engineering by "Emergency Data Request"

Bloomberg has reported that forged "Emergency Data Requests" last year induced Apple and Meta to surrender "basic subscriber details, such as a customer’s address, phone number and IP ...

Your KnowBe4 Fresh Content Updates from March 2022

Check out the 74 new pieces of training content added in March, alongside the always fresh content update highlights and new features.

Simple Facebook Phishing Scam Takes an Unexpected Turn to Throw Potential Victims Off the Scent

Rather than take the usual path of sending an email and linking to a spoofed logon page, this attack takes a different set of actions that at first make no sense but may actually be ...

Cisco: Web 3.0 Will be the Next Frontier for Social Engineering and Phishing Attacks

A look at what makes up Web 3.0 and how it may be used includes insight into what kinds of cyberattacks may plague it, as cybercriminals look for new profitable opportunities.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.