Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

[HEADS UP] Russian Intelligence Officers Charged With Hacking

In a recent article by the Wall Street Journal, U.S. prosecutors charged six Russian intelligence officers who are accused of engaging in the most destructive cyber attacks of recent ...
Continue Reading

The Geography of Business Email Compromise

Researchers at Agari have released a report on the global distribution of business email compromise (BEC) actors, and determined that 25% of these criminals are operating from within the ...
Continue Reading

Threat Actors Take Advantage of Exchange Online and Outlook on the Web with New Levels of Sophistication

New insight from Accenture Security highlights specific ways attackers are changing their tactics to make Microsoft’s email platform a tool rather than an obstacle for phishing attacks.
Continue Reading

Another Office 365 OAuth Attack Targets Coinbase Users to Gain Compromised Email Access

The latest attack attempts to trick Office 365 users that use Coinbase into giving access to their mailbox via a Consent app rather than trying to steal their credentials.
Continue Reading

The Risk of Redirector Domains in Phishing Attacks

Researchers at GreatHorn warn that a large-scale phishing campaign is using open redirects to evade email security filters. Open redirects allow attackers to take a URL from a ...
Continue Reading

Security Awareness Training Compliance and .GOV

A customer sent me the following observation which is something I have been trying to get across for the last 10 years: "I found this interesting – and potentially disconcerting. This ...
Continue Reading

5 Cyber Security Awareness Month Tips for Cybersecurity Professionals

It’s Cyber Security Awareness Month which is a great time of year for everyone to dispense security wisdom like Oprah giving away cars.
Continue Reading

The Secret to This Email Phishing Campaign is Volume

FireEye says a newly characterized cybercriminal gang, FIN11, has been launching widespread email phishing campaigns for the past four years. The group isn’t particularly sophisticated, ...
Continue Reading

Q3 2020 Top-Clicked Phishing Subjects: Coronavirus-Related Attacks Still Prevalent [INFOGRAPHIC]

KnowBe4's latest quarterly report on top-clicked phishing email subjects is here. These are broken down into three different categories: social media related subjects, general subjects, ...
Continue Reading

Two-Month Email Compromise and Impersonation Attack Results in a $15M Take

Read how one unnamed company fell victim to a scam that’s been repeated many times over the last few years, but never with such a massive payoff at the end.
Continue Reading

Fake Social Media Verification Scams Are the Gateway to Something Much More Sinister

Using copyright violation threats or the lure of obtaining a blue checkmark to verify your account, the latest scams easily trick victims out of their social media credentials.
Continue Reading

FINRA Yet Again Becomes the Impersonated Brand at the Center of Phishing Attacks on Brokerage Firms

A mix of domain, phishing emails, a dash of social engineering, and a survey are the recipe for a simple and yet effective campaign targeting the financial sector.
Continue Reading

[HEADS UP] Ransomware Attacks Skyrocket During COVID-19

2020 has been no match for organizations worldwide, including the significant increase of ransomware attacks during the COVID-19 pandemic. As organizations continue to work in a remote ...
Continue Reading

Trends in Malicious Attachments Used in Phishing Emails

People need to be familiar with the types of malicious attachments used in phishing emails, according to Lawrence Abrams at BleepingComputer. One of the most common methods of installing ...
Continue Reading

[eSummit] Your Cybersecurity Awareness Month Action Plan

Cyber threat actors are getting more creative and more skilled at hacking the human. That's why we've created this cybersecurity eSummit to look at evolving attack techniques your end ...
Continue Reading

Sophisticated Mercenary Group Excels at Social Engineering

An extremely skilled group of hackers-for-hire dubbed “Bahamut” is using sophisticated social engineering tactics against a range of targets around the world, researchers at BlackBerry ...
Continue Reading

Cybersecurity Awareness Month Weekly Tip: Password Security

Each week during Cybersecurity Awareness Month, we’re going to be sharing in-depth weekly cybersecurity tips from our evangelists to help your users make smarter security decisions and ...
Continue Reading

Microsoft 365 vs. Office 365: What’s the difference?

There is a lot to be said for consistency in product names, but when you have dozens of products with multiple versions of each, similar names can get confusing fast. We’re looking at ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews