Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

OUCH! REvil Ransomware Attack Hits A-List Celeb Law Firm

OUCH! BBC News was one of the many major media sites who reported May 12 that a media and entertainment law firm used by A-list stars including Rod Stewart, Robert De Niro, Sir Elton John ...
Continue Reading

Watch Out for the Coming Tsunami of Mortgage Rescue Phishing Scams

At this point in time, with 10 years of phishing attack analysis under our belt, we can predict with a high reliability level what will be showing up in the near future. We see two scams ...
Continue Reading

[HEADS UP] Coronavirus Phishing Attacks Skyrocket to 30% Increase

Scammers riding the COVID-19 wave are adapting to new scenarios as the pandemic evolves. Checkpoint recently discovered that over 192,000 coronavirus-related phishing attacks per week ...
Continue Reading

Why Does Someone Click and Become a Victim of a Scam?

One of the keys to thwarting social engineering attacks is knowing what makes us want to click on links or respond to emails, according to cybersecurity expert Raef Meeuwisse. In an ...
Continue Reading

Hacker Group Compromises the Email Accounts of More Than 150 Company’s High-Ranking Executives

The latest string of attacks leverage traditional spear-phishing techniques mixed with the use of Microsoft’s newsletter service, Sway, to trick executives into giving up their Office 365 ...
Continue Reading

Healthcare Providers Get Free Assistance with Remediating Ransomware Attacks

In the wake of ransomware attacks continuing on healthcare providers, despite the obvious need for hospitals and urgent care clinics to remain operational, one company is offering some ...
Continue Reading

Half of Employees Put the Organization at Risk by Watching Adult Content on Work Computers

New data from Kaspersky shows how the pandemic has changed the way people work… and how these new habits increase the organization’s risk of cyberthreat.
Continue Reading

Your Ransomware Task Force: Response, Recovery, and Remediation Tips from the Pros

When you realize your organization has been hit with a ransomware attack there are a few things that need to happen. One… take a deep breath. Two… contain the damage. And three… initiate ...
Continue Reading

[Scam of The Week] Unemployed Americans Are Now Deceived Into Grabbing ‘Remote Jobs’ As Money Mules

There are now tens of millions of people suddenly unemployed, looking for ways to make ends meet.
Continue Reading

It Starts with a Phish: Employee PII at Risk When Pipeline Development Outsourcer Falls Victim to Ransomware Attack

The latest example of a modern-day ransomware attack demonstrates how data encryption and ransom can no longer be the assumed extent of an attack.
Continue Reading

Fake Zoom Downloader is the Latest Method of Attack on Remote Workers

Riding on the coattails of the massive rise in popularity in the video conference solution, remote workers new to Zoom need to be wary of where they download the installer.
Continue Reading

Cybercriminals Lean Heavily on Social Engineering Tactics to Gain Access to Bank Accounts

A series of attack anecdotes shared by Brian Krebs shows how persistent and sophisticated scammers are in using social engineering tactics to gain access to their victim’s bank account ...
Continue Reading

COVID-19 Security Hints & Tips Email Templates In 10 Additional Languages

The Product Content team is happy to announce that our 9 COVID-19 Security Hints and Tips email templates are now available in 10 additional languages. The new emails are available in: ...
Continue Reading

It's World Password Day 2020 - Is Your Organization Safe?

Today is World Password Day, a holiday created by Intel on the first Thursday of May to ensure everyone knows password best practices. “P@ssW0rd” has never been a safe password to use to ...
Continue Reading

Some Phishers Who Know Their Trade

Researchers at Votiro have come across well-crafted phishing emails that purport to come from UPS, FedEx, and DHL. All of the emails contain malicious Excel attachments that will install ...
Continue Reading

What is the Right Password Policy?

What is the right password policy? Conventional password policies say you must have a password at least 8-12 characters long…16 characters or longer if it belongs to an elevated ...
Continue Reading

Q&A With Data-Driven Evangelist Roger Grimes on the Great Password Debate

I get asked a lot about password policy during my travels around the globe giving presentations and from people who email after webinars. Many of the questions are the same and I’ve ...
Continue Reading

Implausible Phishbait, But Someone May Bite

Scammers are impersonating FINRA, the Financial Industry Regulatory Authority, in an attempt to deliver malware or steal SharePoint credentials, Help Net Security reports. FINRA issued an ...
Continue Reading

Reuters: 'State-backed hackers targeting coronavirus responders'

LONDON/WASHINGTON (Reuters) - Government-backed hackers are attacking healthcare and research institutions in an effort to steal valuable information about efforts to contain the new ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews