Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Cybersecurity Awareness Month Weekly Tip: Social Media Safety

Each week during Cybersecurity Awareness Month, we’re going to be sharing in-depth weekly cybersecurity tips from our informative evangelists to help your users make smarter security ...

Middle Management is the Next Target for Phishing Attacks

Mid-level managers need to be particularly wary of targeted phishing attacks, according to Jenn Gast at INKY. Gast explains that criminals can easily conduct open-source research on a ...

[On-Demand] Lessons Learned: An IT Pro’s Experience Building his Last Line of Defense

This is the true story of an IT Manager who was tired of his users clicking everything and wanted to teach them a lesson… in a good way.

Threatening Election Emails Land in Florida Inboxes

If you checked the news this morning, you probably noticed a story getting plenty of play on mainstream news sites: threatening election-themed emails sent to recipients in three states, ...

Notes on Social Engineering, and What to Do About It

Phishing attacks are growing in prevalence during the pandemic, according to David Dufour, Vice President of Engineering and Cybersecurity at Webroot. Webroot’s recent threat report ...

[HEADS UP] Russian Intelligence Officers Charged With Hacking

In a recent article by the Wall Street Journal, U.S. prosecutors charged six Russian intelligence officers who are accused of engaging in the most destructive cyber attacks of recent ...

The Geography of Business Email Compromise

Researchers at Agari have released a report on the global distribution of business email compromise (BEC) actors, and determined that 25% of these criminals are operating from within the ...

Threat Actors Take Advantage of Exchange Online and Outlook on the Web with New Levels of Sophistication

New insight from Accenture Security highlights specific ways attackers are changing their tactics to make Microsoft’s email platform a tool rather than an obstacle for phishing attacks.

Another Office 365 OAuth Attack Targets Coinbase Users to Gain Compromised Email Access

The latest attack attempts to trick Office 365 users that use Coinbase into giving access to their mailbox via a Consent app rather than trying to steal their credentials.

The Risk of Redirector Domains in Phishing Attacks

Researchers at GreatHorn warn that a large-scale phishing campaign is using open redirects to evade email security filters. Open redirects allow attackers to take a URL from a ...

Security Awareness Training Compliance and .GOV

A customer sent me the following observation which is something I have been trying to get across for the last 10 years: "I found this interesting – and potentially disconcerting. This ...

5 Cyber Security Awareness Month Tips for Cybersecurity Professionals

It’s Cyber Security Awareness Month which is a great time of year for everyone to dispense security wisdom like Oprah giving away cars.

The Secret to This Email Phishing Campaign is Volume

FireEye says a newly characterized cybercriminal gang, FIN11, has been launching widespread email phishing campaigns for the past four years. The group isn’t particularly sophisticated, ...

Q3 2020 Top-Clicked Phishing Subjects: Coronavirus-Related Attacks Still Prevalent [INFOGRAPHIC]

KnowBe4's latest quarterly report on top-clicked phishing email subjects is here. These are broken down into three different categories: social media related subjects, general subjects, ...

Two-Month Email Compromise and Impersonation Attack Results in a $15M Take

Read how one unnamed company fell victim to a scam that’s been repeated many times over the last few years, but never with such a massive payoff at the end.

Fake Social Media Verification Scams Are the Gateway to Something Much More Sinister

Using copyright violation threats or the lure of obtaining a blue checkmark to verify your account, the latest scams easily trick victims out of their social media credentials.

FINRA Yet Again Becomes the Impersonated Brand at the Center of Phishing Attacks on Brokerage Firms

A mix of domain, phishing emails, a dash of social engineering, and a survey are the recipe for a simple and yet effective campaign targeting the financial sector.

[HEADS UP] Ransomware Attacks Skyrocket During COVID-19

2020 has been no match for organizations worldwide, including the significant increase of ransomware attacks during the COVID-19 pandemic. As organizations continue to work in a remote ...

Trends in Malicious Attachments Used in Phishing Emails

People need to be familiar with the types of malicious attachments used in phishing emails, according to Lawrence Abrams at BleepingComputer. One of the most common methods of installing ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.