Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Cybercriminals Use Telegram Bots to Exfiltrate Data In Phishing Kit Campaign

KnowBe4 ThreatLabs has identified and analyzed a sophisticated cross-platform phishing campaign that utilizes Telegram as its primary exfiltration channel. The campaign uses a combination ...

You Are Still Vulnerable to Password Attacks When Using Passkeys

Just because you’re using a passkey doesn’t mean your password is gone.

Phishing Kits Are Growing More Sophisticated; Focused on Bypassing MFA

Researchers at Cisco Talos warn that major phishing kits continue to incorporate features that allow them to bypass multi-factor authentication (MFA).

Talos Report: Phishing Attacks Surged in Q1 2025

Phishing was the initial access vector in 50% of attacks during the first quarter of 2025, according to a new report from Cisco Talos.

Warning: Phishing Campaign Impersonates the US Social Security Administration

Researchers at Malwarebytes warn that phishing emails are impersonating the US Social Security Administration (SSA) to trick users into installing the ScreenConnect remote access tool.

Your KnowBe4 Compliance Plus Fresh Content Updates from April 2025

Check out the April updates in Compliance Plus so you can stay on top of featured compliance training content.

Your KnowBe4 Fresh Content Updates from April 2025

Check out the 21 new pieces of training content added in April, alongside the always fresh content update highlights, new features and events.

Exciting Leadership Updates at KnowBe4

To our valued KnowBe4 customers, partners, and community. I wanted to share some exciting developments happening at KnowBe4.

Xfinity Scam Might Explain Similar Scams

Recently, I covered a T-Mobile scam where a friend of mine narrowly avoided losing money. In that scam, the attackers called up pretending to be from T-Mobile offering him a ...

Email Remains the Top Attack Vector for Cyberattacks

Email is still the most common attack vector for cyber threats, according to a new report from Barracuda.

Hundreds of Fortune 500 companies have hired North Korean operatives.

Cyberwire wrote: "WIRED has published a report on North Korea's efforts to obtain remote IT positions at foreign companies, noting that these fraudulent workers are now using AI tools to ...

Cybercriminals Impersonate DHS Amid Deportation Efforts

Researchers at INKY warn that criminals are impersonating the US Department of Homeland Security to launch phishing scams.

A Sneaky T-Mobile Scam and Lessons That Were Learned

A friend of mine got a call on his phone and he regrettably picked it up. The number was 267-332-3644. The area code is from Bucks County, PA, where he used to live many years ago.

Researchers Warn of Surge in Infostealers Delivered Via Phishing

The number of infostealers delivered via phishing emails increased by 84% last year, according to a new report from IBM’s X-Force researchers. Threat actors are using these malware ...

What Is Device Code Phishing?

Ever since Microsoft’s initial announcement on February 13, 2025, about a Russian nation-state phishing campaign using "device code phishing," many people have been wondering what it is. ...

Criminals Exploit the Death of Pope Francis to Launch Scams

Scammers are exploiting the death of Pope Francis to launch social engineering attacks, according to researchers at Check Point.

AJ from The Inside Man Now Coaching Your Users Real-time with Security Coach

Do your users love The Inside Man? See more of beloved character AJ, now in SecurityCoach!


Get the latest insights, trends and security news. Subscribe to CyberheistNews.