KnowBe4 Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in human and agent security including social and prompt engineering, ransomware and phishing attacks.

Warning: Phishing Attacks Are Abusing the Kuse AI App

Attackers are abusing the storage and sharing features of Kuse, a free AI app, to assist in phishing campaigns, according to researchers at Trend Micro. Kuse is a legitimate agentic AI ...

Phishing Campaign Exploits Google AppSheets to Target Facebook Accounts

Researchers at Guardo Labs are tracking a major phishing campaign that abused Google AppSheet as a relay to send phishing emails. The researchers identified more than 30,000 Facebook ...

FTC: Americans Lost $2.1 Billion to Social Media Scams Last Year

A new report from the US Federal Trade Commission (FTC) has found that Americans lost $2.1 billion in 2025 to scams that began on social media. Nearly 30% of people who reported losing ...

What Is an Al Agent in Cybersecurity?

At the Milken Conference in May 2026, Robert F. Smith, founder and CEO of Vista Equity Partners, described a shift that every security leader should hear. Software, he said, has moved ...

Why Integrate Threat Intelligence Feeds into Email Security?

It's getting harder to distinguish legitimate emails from malicious ones as phishing messages mimic real conversations, use trusted domains and increasingly leverage AI to scale and ...

Redesigning Security Culture for the Agentic Age

The launch of platforms like Moltbook, OpenClaw, and RentAHuman in early 2026 has provided an unsettling glimpse into the future. We are entering a phase of the digital workplace where AI ...

Traffic-Themed SMS Phishing Targets Users Around the World

Researchers at Bitdefender are tracking 40 separate SMS phishing (smishing) campaigns impersonating transport authorities, toll operators, and parking services around the world. The ...

Fighting AI-Assisted Ransomware Threats

This Anti-Ransomware Day, it's important to recognize the ever-changing landscape of cyber threats and how organizations can fortify their defenses. The evolution from traditional ...

Phishing Attacks Begin Targeting the 2026 FIFA World Cup

A major phishing operation is targeting soccer/football fans ahead of the 2026 FIFA World Cup, which begins in June, according to researchers at Flare. The attackers have set up at least ...

Warning: Netflix Phishing Scams Can Lead to Serious Consequences

Researchers at Bitdefender warn that Netflix-themed phishing attacks can have far-reaching consequences if users follow poor security practices. While Netflix is generally associated with ...

Navigating the Cybersecurity Landscape in India Empowering Human and AI Agents

Introduction In recent years, India has emerged as a significant player in the global digital economy, yet this growth is paralleled by an escalating cybersecurity threat landscape. With ...

The Rise of Cyber Threats and AI in the Philippines: A New Era Beyond Legacy Security

Introduction The Philippines, like many other nations, is witnessing a dramatic increase in cyber threats, fueled by the rapid adoption of digital technologies and the proliferation of ...

Report: 4 in 10 UK Businesses Were Breached by Phishing Last Year

43% of businesses in the UK reported a breach last year, with phishing driving the vast majority (85%) of these attacks, the Register reports. A survey by the British government found ...

Navigating Human and Agentic Risks for Financial Institutions in the APJ Region

Introduction The Asia-Pacific and Japan (APJ) region, with its dynamic economic growth and technological advancements, presents unique challenges and opportunities in the realm of human ...

You Have 60 Seconds to Stop the Breach. Are You Ready?

2026 has officially become the year of speed, scale and support The delta between a phishing email landing and a full organizational compromise has shrunk to mere seconds.

From Cyberwar to Cognitive Warfare: The Geopolitical Impact on Cybersecurity in Africa

We’ve long defined cybersecurity as the technical discipline of protecting networks, data and systems. But when viewed through a geopolitical lens, then this definition is no longer ...

World Password Day 2026: Treat Identity as the Perimeter (and Act Like It)

World Password Day is no longer just a nudge to pick stronger passwords, it’s a moment to rethink identity. Attackers rarely “hack” systems today; they log in as you. Combine expert ...

Attackers Continue to Pose as Help Desks in Social Engineering Attacks

Researchers at Google’s Threat Intelligence Group (GTIG) are tracking a new threat actor that’s impersonating help desks to trick users into installing malware. The threat actor, which ...