Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Your KnowBe4 Fresh Content Updates from September

With 52 new pieces of training content added this month, check out the always fresh content update highlights and new features from the month of September.

[On-Demand Webinar] 5 Things You Need To Know About Ransomware Before It's Too Late

Cybercriminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. And few organizations are prepared to ...

Telecom Company Responsible for Routing Billions of Text Messages Annually Acknowledges Multi-Year Breach

Mentioned in passing as part of a Securities and Exchange Commission (SEC) filing, Syniverse admits to hackers having access for five years, potentially impacting millions of mobile phone ...

Phishing: Low- Middle- and High-Level

Phishing attacks have varying levels of technical sophistication, according to Mark Nicholls from Redscan. In an article published by ITProPortal, Nicholls explains that the lowest level ...

New James Bond Movie is Cybercriminals Shiniest Phishbait

Cybercriminals are using the new James Bond movie, No Time to Die, as phishbait, the National reports. Researchers at Kaspersky warn that malicious ads and phishing sites are claiming, ...

Hackers rob thousands of Coinbase customers using phishing attacks and an MFA flaw

Bleepingcomputer was first to report: "Crypto exchange Coinbase disclosed that a threat actor stole cryptocurrency from 6,000 customers after using a vulnerability to bypass the company's ...

Phishing Attacks Maintain “New Normal” Elevated Levels into the Middle of 2021

New data from the Anti-Phishing Working Group (AWPG) shows the Q2 of 2021 showed similar phishing activity to that of Q1, indicating no slowdown in attacks.

90% of All Cyber Attacks on Organizations Involve Social Engineering

It’s official: threat actors and cybercriminal gangs alike are enlightened and have locked in on the use of social engineering as the primary means to trick recipients into becoming ...

Phishing Campaign Impersonates Zix Messages

Researchers at Armorblox have spotted a credential phishing campaign that’s impersonating encrypted communications from Zix. The emails contain a link to download an HTML attachment.

Happy Cybersecurity Awareness Month 2021 from KnowBe4!

Cybersecurity Awareness Month takes place every October. It is a month dedicated to raising cybersecurity awareness, educating your employees on how to better protect the organization, ...

Europol: Italian Mafia Tied to Cybercriminals Responsible for €10 Million in Cyberattacks

The recent dismantling of a cybercriminal gang has uncovered ties to the Italian Mafia, demonstrating that even traditional organized crime is moving to cyber.

5th Circuit Court Finds Cyber Insurer Must Pay for $1 Million Social Engineering Attack

A simple social engineered Business Email Compromise attack resulted in fraud that the cyber insurer contended was not covered under the policy.

Phishing Kits and Phishing-as-a-Service Responsible for Over 300,000 URLs Used in Phishing Attacks

Lowering the barrier to market even more, this new Phishing as a Service (PhaaS) spotted by Microsoft puts quality phishing templates and sites into the hands of any would-be cyber ...

Someone's Impersonating the California DMV in Texts

The California DMV has warned of an ongoing smishing campaign seeking customers’ personal and financial information, Pasadena Now reports.

Google Ads Abused to Deliver Malware

Cybercriminals are using malicious Google Ads to deliver the ZLoader banking Trojan, ZDNet reports. Researchers at Microsoft stated on Twitter that attackers are purchasing Google Ads ...

New Tactic: Shortened LinkedIn URLs Are Now Used As Phish Hooks

Scammers are using shortened LinkedIn URLs to disguise phishing links, according to Jeremy Fuchs at Avanan. LinkedIn automatically shortens links that are longer than 26 characters. The ...

WHAT IS XDR (EXTENDED DETECTION AND RESPONSE)?

ReliaQuest published a good article a little while back that quickly defines XDR and what it can do for you. This may save you some time and gets you up to speed on the latest security ...

Newest iPhone Launch is Now a Scammer's Advantage

Scammers are taking advantage of the launch of iPhone 13, according to researchers at Zscaler. The launch event was streamed live last week on Apple’s official YouTube channel, and ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.