Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Ransomware Attacks Run Rampant as Fujifilm Becomes the Next Victim

We just covered a recent story today that there was a ransomware attack on Steamship Authority. And like clockwork, another company becomes the next victim.

[REUTERS BREAKING NEWS] U.S. to give ransomware hacks similar priority as terrorism

June 3, 2021 - 3:30PM EDT -- The U.S. Department of Justice is elevating investigations of ransomware attacks to a similar priority as terrorism in the wake of the Colonial Pipeline hack ...

Everyone Has It Wrong. It Is Not Double Extortion, It Is Quintuple Extortion!

I keep seeing a new ransomware term, “double extortion” being discussed. It is the hot, new buzzword surrounding ransomware. This term attempts to summarize how ransomware is no longer ...

Ransomware's Impact Highlights the Threat of Social Engineering

Ransomware actors are continuing to shift their focus to disrupting operations that affect people’s daily lives, according to the Wall Street Journal. A ransomware attack on Wednesday ...

REvil Ransomware Behind Attack on the World’s Largest Meat Producer

As ransomware gangs continue to target large organizations, and in the wake of several high-profile companies, this latest news demonstrates how effective and impactful cybergangs are.

Fake Positive Reviews Mask Spoofed Browser Extensions

Malicious browser extensions often have fake positive reviews to garner trust from users, according to Brian Krebs. Krebs describes a phony Microsoft Authenticator extension in the Google ...

[On-Demand Webinar] Learn to Detect and Defend Against Supply Chain Attacks Before They Compromise Your Network

Your job is to safeguard your organization and its assets from bad actors trying to infiltrate your network. But what do you do when the threat is coming from what looks like a trusted ...

Use of TLS to Obfuscate Malicious C2 Communications Doubles in the Last Year

With 98% of all web traffic going over HTTPS, the malicious use of TLS (transport layer security) helps the cybercriminal conceal their activity specifics while also potentially doing so ...

Two-Thirds of Organizations Plan to Improve Their Cybersecurity in the Wake of Devastating Ransomware Attacks

With 81% of organizations believing ransomware attacks will become more prevalent in the second half of 2021, nearly everyone is preparing for the worst to come.

Cyber Hygiene not a Focus for Cybersecurity Leaders, Despite Being Targets of Attacks Themselves

New findings from a survey of over 100 global cybersecurity leaders across all major industries sheds light on the apathy around needed proper cyber hygiene in their own lives.

New Ransomware Strain Epsilon Red is Reported

Researchers at Sophos report finding a new ransomware strain in the wild. They call it “Epsilon Red.” The malware is written in GO, and it was delivered as the final executable payload in ...

[Heads Up] Microsoft: SolarWinds hackers spear phish govt agencies from 24 countries

The Microsoft Threat Intelligence Center (MSTIC) has discovered that the SolarWinds hackers are behind an ongoing spear-phishing campaign targeting government agencies worldwide.

New Email Attack Takes a Phishing-Turned-Vishing Angle to Steal Credit Card Info

Details on this new scam demonstrate how cybercriminal gangs are working to try use new mediums and social engineering methods to trick users into becoming victims.

Get Prepared Now: New Executive Order Signals Cyber Regulations in the Future

The White House’s latest Executive Order on Improving the Nation’s Cybersecurity provides insight into what organizations should expect in the future and what they need to do today.

Business Email Compromise Attacks Are Evolving, Becoming More Convincing and More Expensive

The “business” of BEC is becoming increasingly more lucrative for cybercriminals, as they develop new ways to defraud individuals and organizations of their money.

New Would-Be Ransomware Attack Only Focuses on Stealing Data via the Java-Based STRAAT Malware

New details from Microsoft Security Intelligence discuss an attack that displays ransomware-like behavior, but simply seeks to install the credential theft-focused remote access trojan.

Call Centers Used to Distribute BazarLoader

Cybercriminals are using call centers to trick users into downloading the BazarLoader malware, according to researchers at Palo Alto Networks’ Unit 42. By relying on social engineering to ...

A Popular Fraud Combo is Back: Elon Musk and Bitcoin

Researchers at Bitdefender warn that cybercriminals continue to impersonate Elon Musk in Bitcoin scams. One campaign that started on May 15 involved sending thousands of emails telling ...

Cybersecurity Insurance Landscape Is Fundamentally Changing Right Now

By Roger Grimes. Ransomware is stealing so much money and interrupting so many businesses that it might be the beginning of their undoing. It is certainly radically changing the ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.