Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Cybersecurity and Business Priorities Don’t Appear to Be Aligning – and That’s Bad for Your Security Stance

Despite organizational leadership believing cyber security initiatives can support business goals, the way businesses approach cybersecurity seems to prove otherwise.

An Unusual Attachment is Most Likely a Phishing Campaign

A phishing campaign is using Windows Imaging Format (WIM) files to deliver malware, according to researchers at Trustwave. WIM files aren’t commonly thought of as potentially malicious, ...

Misconfigured Cloud Database Increases Risk of Social Engineering

DreamHost, a major website hosting provider, exposed 814 million user account records in an unsecured database, researchers at Website Planet have found. The data exposed included a ...

[HEADS UP] Over 400% Increase in Ransomware Victims

According to a recent report by OODA Loop, "Mandiant claims to have detected a 422% increase in victim organizations announced by ransomware groups via their leak sites year-on-year ...

Threat Actors use Google Ads to Target People Migrating to Encrypted Messaging Services like Signal and Telegram

Researchers at eSentire warn that threat actors have been using Google Ads to target people migrating from WhatsApp to other encrypted messaging services, particularly Signal and Telegram.

Attackers Abuse Google Docs for Phishing Attacks

Attackers are using a new technique to exploit Google Docs for phishing attacks, according to researchers at Avanan. The attackers take advantage of the fact that Google Docs ...

ADATA Ransomware Attack Results in the Publishing of 700GB of Data Stolen

The headline alone sounds the warning that ransomware gangs aren’t just threatening to release exfiltrated data; they’re full out retaliating when they don’t get their ransoms paid.

60% of Orgs Needed New Security Policies to Secure Their Remote Workforce

According to security compliance vendor ThreatSwitch in their 2021 Industrial Security Benchmark Report, organizations are waking up to the need for better awareness training.

Turning Compliance Into Tangible Security

Compliance and security are supposedly about risk management. Both seek to reduce the chances that threats and their risks will be able to successfully exploit a target. But they are ...

80% of Ransomware Victim Organizations Experience a Second Attack

The impact of ransomware attacks is much more than just the sensationalized cost of ransoms. New data spells out how victim organizations have suffered at the hands of ransomware.

Leaked Copies of Windows 11 Could Be Tempting Phishbait for Techies

The latest anticipated release of Windows should be a reminder that even IT folks can be driven into a frenzy enough to miss the signs of a malicious campaign.

Why Phishing Attacks Are So Easy, Successful and Profitable – and What to do About It

With phishing attacks being thought to have started literally 25 years ago, what makes this age-old method so continually valuable as a tool for cybercriminals and scammers?

The Number of Phishing Sites in March Was Twice That of the Previous Year

With the number of phishing sites in Q1 overall up 47%, according to new data from Phishlabs, the bad guys are starting their year off letting you know… they mean business.

KnowBe4 Makes eSecurity Planet's Best Security Awareness Training for Employees 2021 List

Security awareness training has made leaps and bounds in the last couple of years. With the old-school approach, a few bagels and long, boring powerpoint presentations can only get you so ...

Credential Stuffing in the Travel and Retail Sectors

The travel and retail sectors are the top targets for credential stuffing attacks, according to Auth0’s State of Secure Identity report. Credential stuffing is a type of brute-force ...

Understanding Ransomware’s True Costs

We all know ransomware is pretty bad, but if you are a cybersecurity risk manager trying to justify the latest purchase to mitigate it, nailing down real numbers can be pretty hard. There ...

[Heads Up] If You're an Amazon Prime Shopper, Heed This Prime Day Phishing Alert

Amazon Prime Day is approaching on June 21st with special promotions. This also mean cybercriminals are ready to strike with leveraging 'special deals' on the online days that they will ...

Bad Security Habits During the Pandemic

56% of IT workers believe employees have acquired poor security habits while working remotely, according to Tessian’s Back to Work Security Behaviors report.

Ragnar Locker Ransomware Finds Its Next Victim in Taiwan Computer Memory Manufacturer ADATA

The ransomware attack occurring in late-May required the maker of consumer and industrial memory products to take systems offline, causing them to recover and upgrade affected systems.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.