How Social Engineers Use Social Media
People need to be aware of how their social media posts can be used against them, according to Darren Millar, senior vice president of operations at PiiQ Media. In an article for ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
People need to be aware of how their social media posts can be used against them, according to Darren Millar, senior vice president of operations at PiiQ Media. In an article for ...
Microsoft's Security Intelligence team recently sent an alert to Office 365 users and admins to watch out for a suspicious phishing email that uses spoofed sender addresses.
Bitdefender has observed a phishing campaign that tries to blackmail users into sending money by claiming their computer has been hacked. The emails contain real passwords that have been ...
Are you attending Black Hat USA 2021 (either in person or virtually) ? Be sure to stop by the KnowBe4 booth August 4th - 5th to find out how to secure your last line of defense: USERS.
Researchers at Coveware recently analyzed ransomware attacks during Q2 of this year and noticed a similar trend in ransomware attack methods by cybercriminals.
According to the 2021 Cyber Threat Report by SonicWall, 304.7 million ransomware attacks occured in the first half of 2021, already surpassing the total number of ransomware attacks for ...
It’s the 22nd annual SysAdmin Day, a day when we celebrate all of the incredible System Administrators! While your job may not be easy (and sometimes not glamorous), your work on the ...
The “Evernote for creatives” collaborative platform is being used to legitimately host malicious links that point victims to phishing links, bypassing detection mechanisms.
Despite so much news surrounding phishing attacks pretending to be from Microsoft’s Office 365 platform, a new report from Vade Secure provides a global perspective to impersonation.
This massive increase in the number of victim organizations being named demonstrates the harsh reality of how far ransomware threat actors will actually go if ransoms aren’t paid.
Researchers at WMC Global have found that a phishing kit is using images with inverted colors to avoid detection.
The cybercriminal underground is becoming increasingly organized, according to researchers at HP. The criminal underground functions like a regular economy, with people selling goods and ...
In a new twist, security researchers at Analyst1 have identified four Russian ransomware gangs that actively work together to coordinate attacks, data leaks, and more.
After well over a year of getting used to working from home, as U.K. employees look to head back into the office, new data shows they don’t see themselves as a cyber risk (which makes ...
The fallout after a ransomware attack is more devastating than previously thought. New data spells out what you should really expect after being hit with ransomware.
Phishing activity increased dramatically in the second quarter of 2021, according to a recent report by Vade. The company observed 4.2 billion phishing emails in June alone.
Researchers at Avanan warn that attackers are exploiting the collaboration and note-taking app Milanote to host phishing links.
A new report focused on businesses looking to bring employees back to the office makes it very clear that security leaders are concerned, as remote workers have been anything but secure.
In the wake of cyberattacks targeting U.S. infrastructure organizations, the U.S. government is stepping up measures to identify foreign threat actors and bring them to justice.