Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

New Would-Be Ransomware Attack Only Focuses on Stealing Data via the Java-Based STRAAT Malware

New details from Microsoft Security Intelligence discuss an attack that displays ransomware-like behavior, but simply seeks to install the credential theft-focused remote access trojan.

Call Centers Used to Distribute BazarLoader

Cybercriminals are using call centers to trick users into downloading the BazarLoader malware, according to researchers at Palo Alto Networks’ Unit 42. By relying on social engineering to ...

A Popular Fraud Combo is Back: Elon Musk and Bitcoin

Researchers at Bitdefender warn that cybercriminals continue to impersonate Elon Musk in Bitcoin scams. One campaign that started on May 15 involved sending thousands of emails telling ...

Cybersecurity Insurance Landscape Is Fundamentally Changing Right Now

By Roger Grimes. Ransomware is stealing so much money and interrupting so many businesses that it might be the beginning of their undoing. It is certainly radically changing the ...

UK Royal Mail Smishing Crew Nabbed By City Of London Police

According to a report by ZDNet, there were arrests made due to suspicions of sending 'smishing' texts. Smishing is a form of phishing that sends SMS messages in order to steal personal ...

[On-Demand Webinar] Setting the Trap: Crafty Ways the Bad Guys Trick Your Users to Own Your Network Featuring Kevin Mitnick

The bad guys are out there, watching and waiting for an opportunity to strike. They have carefully researched your organization in order to set the perfect trap. And the perfect ...

More Targeted Phishing Attacks Are Coming!

I have been in the cybersecurity business for 34 years. I am not an innately brilliant, but one of the things I seem to do well is to spot trends as they happen early in their cycle. It ...

Low-Grade Ways of Bypassing Email Scanners

Cybercriminals are replacing common words in phishing scams with synonyms in order to bypass security filters, according to researchers at Avanan. For example, one phishing lure contained ...

Ransomware-as-a-Service is Organizing, Becoming More Devastating and Costly

Take a look at the complex relationships that exist today between the ransomware gangs and the various services they utilize, and you quickly realize this is a very organized and ...

The FBI’s Internet Crime Complaint Center Marks Its 6 Millionth Complaint as Pace Accelerates

The rate at which cyberattacks are increasing are being noticed by both their victims and the FBI, who are seeing more people affected by online crimes and scams.

Credential Stuffing the Financial Services Sector

Credential stuffing in the financial services industry has risen significantly over the past year, according to Akamai’s latest State of the Internet / Security report. Credential ...

When Cryptocurrency Investments Really Are Too Good To Be True

The US Federal Trade Commission (FTC) reports that victims have lost more than $80 million in cryptocurrency scams since October of last year, with about $2 million of that total going to ...

Transparent Tribe Uses Spoofed Domains in Social Engineering Attacks

Researchers at Cisco Talos warn that the threat actor known as “Transparent Tribe” (also known as APT36 and Mythic Leopard) is using spoofed websites and malicious documents to deliver ...

[NEW PhishER Feature] Flip the Script on Phishing Emails with PhishFlip

We are excited to announce the availability of PhishFlip™ as part of the PhishER product to all PhishER customers.

Ransoms Increase 43% as More Ransomware Attacks Include the Threat to Leak Exfiltrated Data

With average payments rising to over $220K, organizations scramble to stop ransomware attacks as gangs begin taking more advantage of software vulnerabilities as their attack vector.

Healthcare Organizations Should Expect Cyber Insurance Premiums to Increase 25 to 50% This Year

In light of recent upticks in payouts – particularly around ransomware – cyber insurers are better understanding the risk and are adjusting rates accordingly.

Paying the Ransom Is Not Just About Decryption

I just read that a well-known pipeline company paid $5M to the ransomware hacker group. And despite that, they are still having to use their backups because the decryption process is too ...

Kicking You While You’re Down: Ransomware Attacks Begin to Adopt a “Triple Extortion” Model

New tactics spotted by security researchers at CheckPoint indicate a growing pattern by ransomware gangs to use additional extortion actions to increase revenues and ensure payment.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.