Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

The Geography of Business Email Compromise

Researchers at Agari have released a report on the global distribution of business email compromise (BEC) actors, and determined that 25% of these criminals are operating from within the ...

Threat Actors Take Advantage of Exchange Online and Outlook on the Web with New Levels of Sophistication

New insight from Accenture Security highlights specific ways attackers are changing their tactics to make Microsoft’s email platform a tool rather than an obstacle for phishing attacks.

Another Office 365 OAuth Attack Targets Coinbase Users to Gain Compromised Email Access

The latest attack attempts to trick Office 365 users that use Coinbase into giving access to their mailbox via a Consent app rather than trying to steal their credentials.

The Risk of Redirector Domains in Phishing Attacks

Researchers at GreatHorn warn that a large-scale phishing campaign is using open redirects to evade email security filters. Open redirects allow attackers to take a URL from a ...

Security Awareness Training Compliance and .GOV

A customer sent me the following observation which is something I have been trying to get across for the last 10 years: "I found this interesting – and potentially disconcerting. This ...

5 Cyber Security Awareness Month Tips for Cybersecurity Professionals

It’s Cyber Security Awareness Month which is a great time of year for everyone to dispense security wisdom like Oprah giving away cars.

The Secret to This Email Phishing Campaign is Volume

FireEye says a newly characterized cybercriminal gang, FIN11, has been launching widespread email phishing campaigns for the past four years. The group isn’t particularly sophisticated, ...

Q3 2020 Top-Clicked Phishing Subjects: Coronavirus-Related Attacks Still Prevalent [INFOGRAPHIC]

KnowBe4's latest quarterly report on top-clicked phishing email subjects is here. These are broken down into three different categories: social media related subjects, general subjects, ...

Two-Month Email Compromise and Impersonation Attack Results in a $15M Take

Read how one unnamed company fell victim to a scam that’s been repeated many times over the last few years, but never with such a massive payoff at the end.

Fake Social Media Verification Scams Are the Gateway to Something Much More Sinister

Using copyright violation threats or the lure of obtaining a blue checkmark to verify your account, the latest scams easily trick victims out of their social media credentials.

FINRA Yet Again Becomes the Impersonated Brand at the Center of Phishing Attacks on Brokerage Firms

A mix of domain, phishing emails, a dash of social engineering, and a survey are the recipe for a simple and yet effective campaign targeting the financial sector.

[HEADS UP] Ransomware Attacks Skyrocket During COVID-19

2020 has been no match for organizations worldwide, including the significant increase of ransomware attacks during the COVID-19 pandemic. As organizations continue to work in a remote ...

Trends in Malicious Attachments Used in Phishing Emails

People need to be familiar with the types of malicious attachments used in phishing emails, according to Lawrence Abrams at BleepingComputer. One of the most common methods of installing ...

[eSummit] Your Cybersecurity Awareness Month Action Plan

Cyber threat actors are getting more creative and more skilled at hacking the human. That's why we've created this cybersecurity eSummit to look at evolving attack techniques your end ...

Sophisticated Mercenary Group Excels at Social Engineering

An extremely skilled group of hackers-for-hire dubbed “Bahamut” is using sophisticated social engineering tactics against a range of targets around the world, researchers at BlackBerry ...

Cybersecurity Awareness Month Weekly Tip: Password Security

Each week during Cybersecurity Awareness Month, we’re going to be sharing in-depth weekly cybersecurity tips from our evangelists to help your users make smarter security decisions and ...

Microsoft 365 vs. Office 365: What’s the difference?

There is a lot to be said for consistency in product names, but when you have dozens of products with multiple versions of each, similar names can get confusing fast. We’re looking at ...

The Market for Phishing Kits

Inexperienced cybercriminals can easily find places to buy phishing kits in the open, on the “surface web” (as opposed to the deep or dark web), according to Jan Kopriva at the SANS ...

Scam Of The Week: Bad Guys Prep For Prime Day Phishing Attacks

Amazon, the world’s largest online retailer, hosts a massive sales event once a year called Prime Day. Usually set in July, the highly awaited two-day event was postponed until October ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.