Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

There’s Still No Real Answer to the Ransomware Epidemic

With ransomware evolving at a rapid pace, ransoms increasing, and organizations still becoming victims, what’s the answer to stop ransomware once and for all?

Every Employee is Part of Your Security

Employees are an essential component of an organization’s security defenses, according to Nico Popp, Chief Product Officer at Forcepoint. On the CyberWire’s Hacking Humans podcast, Popp ...

Cold Reality Dawns: Covid-19 Is Likely Here to Stay But Your Employees Are Vulnerable

The Wall Street Journal just wrote: "As Covid-19 Vaccines Raise Hope, Cold Reality Dawns That Illness Is Likely Here to Stay. Ease of transmission, new strains, limits of vaccination ...

How the United States Lost to Hackers, And Why The New President Wants To Fix It With 10 Billion Dollars

Nicole Perlroth, the New York Times cybersecurity reporter, just came out with a very interesting perspective on our troubles with foreign adversaries, in part created by our own ...

One-Fourth of a SOC’s Life Is Researching Sketchy Emails

This is a pretty amazing stat – nearly one-fourth of a security operation center’s (SOC’s) time is spent preventing, detecting, responding to, and researching potentially malicious ...

SOC teams spend nearly a quarter of their day handling suspicious emails

Jeremy Fuchs at Avanan just blogged about a new report they released. It revealed some surprising results about the time SOC teams have to spend investigating suspicious emails reported ...

Hackers are Winning the Cyberwar, Largely Because They Target People

Researchers at HackNotice have found that the number of data breaches is increasing, while the number of breach notifications is declining, SecurityWeek reports. HackNotice analyzed ...

Using Legitimate Services to Bypass Phishing Protections

Researchers at Abnormal Security have identified two techniques that attackers are using to bypass email security filters. The first tactic takes advantage of the fact that Microsoft ...

[On-Demand Webinar] A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing ...

UK Research and Innovation Becomes Next Victim Hit with Ransomware

UK Research and Innovation (UKRI) has been hit by a ransomware attack that impacted two of its services, BleepingComputer reports. The UK government department said it’s still unsure if ...

[Heads Up] Email Phishing Is Now the Top Ransomware Attack Vector

New data shows that pushback from the ransomware victim “market” may be influencing just how much cybercriminals are asking for as ransom and are being paid.

Trickbot is Targeting the Legal Sector

Researchers at Menlo Security warn of an ongoing Trickbot campaign targeting the legal and insurance industries. Trickbot is a notorious remote access Trojan that was in the crosshairs of ...

KnowBe4 Fresh Content Updates from January: Including 'The Inside Man' Season 3 Official Trailer

Here are important fresh content updates and new features to share with you that happened in the month of January.

[HEADS UP] New Phishing Kit Spotted on Over 700 Domains

A cybercriminal gang has recently developed a new phishing kit named LogoKit on several domains. LogoKit changes logos and text in real-time in order to adapt to the targeted victims.

Beware the Long Con Phish

Social engineering and phishing happen when a con artist communicates a fraudulent message pretending to be a person or organization which a potential victim might trust in order to get ...

Data Privacy and Fingerprints

Most people know, primarily criminals, that you don't want to leave the oils from your fingers at a crime scene because it creates a fingerprint. Everyone has them (unless they don't have ...

2021 Begins a New Decade of Privacy

Privacy issues came about all across the board in 2020, and 2021 will be no different. From WhatsApp updating their terms of service and losing millions of users to countless proposals by ...

NSA Warns Against Using Third-Party DNS and Encourages DNS Over HTTPS

As cybercriminals look for new ways to attack organizations, the National Security Agency takes a hard look at how DNS can be manipulated and makes recommendations on how to secure it.

Australians Experienced over 200K Scams in 2020 Costing Over A$176 Million

New data from the Australian government’s Scamwatch site shows that phishing and vishing topped the list of scam types used to trick Australians into becoming a scam’s next victim.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.