Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Ransomware Attacks Step Up their Game and Now Look for NAS Devices

It used to be that ransomware just looked for office files. Then backups became a secondary victim. New data from Kaspersky shows NAS devices are being added as targets.
Continue Reading

New TrickBot Malware Attack Leverages Google Drive to Deliver Its Payload and Ensure Infection

New details from Palo Alto Network’s Unit 42 research team show TrickBot rearing its ugly head once again, using legitimate cloud services – and employee greed – as its path to success. ...
Continue Reading

Penn State Warns of Spear Phishing Attacks

Penn State is warning its community about a recent spike in phishing attacks targeting the university’s employees. Attackers are sending emails posing as real Penn State employees and ...
Continue Reading

[FUN DEPT] So, How Do You Say Congrats In A *Really* Big Way?

I was scratching my head. How do you say Congrats to your team when they have done a truly AWESOME job in 2019, and totally knocked it out of the park in the last quarter?
Continue Reading

CyberheistNews Vol 10 #2 [Heads-Up] The U.S. Government Issues a Warning About a Possible New Wave of Iranian Cyber Attacks

CyberheistNews Vol 10 #02 [Heads-Up] The U.S. Government Issues a Warning About a Possible New Wave of Iranian Cyber Attacks Christopher C. Krebs, Director of America's CISA, the new ...
Continue Reading

[On-Demand Webinar] Business Email Compromise During Tax Season: Spotting and Defending Against Common BEC Tax Scams

Tax season is upon us, which makes this prime time for hackers to target your unsuspecting users with the latest Business Email Compromise (BEC) scams. From evolved W2 fraud to ...
Continue Reading

Security Generation Gaps

People from different generations tend to approach cybersecurity differently. Organizations should tailor their security programs and phishing tests with this in mind. According to Azeem ...
Continue Reading

Announcing A New 8-Minute Training Module - Social Media: Staying Secure in a Connected World

As you probably know, social media is the number one place that attackers can get intel about your organization to make their "hacking of your humans" more effective. We have been hearing ...
Continue Reading

U.S. Government Issues Warning About Possible Iranian Cyberattacks

Christopher C. Krebs, Director of Cybersecurity and Infrastructure Security Agency issued a warning about a potential new wave of Iranian cyber-attacks targeting U.S. assets after Maj. ...
Continue Reading

Seven Kinds of Malware, and all Arrive by Social Engineering

Naked Security outlines seven different categories of malware and describes how each of them through social engineering techniques can affect your organization. Some or all of these ...
Continue Reading

Global Climate Change Phishbait

A number of phishing campaigns have been using Christmas-themed emails encouraging recipients to support climate activist Greta Thunberg, according to Paul Ducklin at Naked Security. ...
Continue Reading

Wawa Data Breach Class Action Filed

There was a massive data breach suffered by Wawa, a convenience store chain of more than 850 stores around the country. Wawa had recently disclosed that it had suffered a data breach that ...
Continue Reading

75% of European Enterprises Cite a Lack of Awareness Training a Challenge to Establish a Proper Cybersecurity Stance

The latest data from VMware and Forbes Insights shows organizations across EMEA are deficient in a number of fundamental cybersecurity needs.
Continue Reading

More Fake Windows 10 Updates Spell Hefty Ransoms for Victims

With Windows 7 ending support this month, organizations moving to or already on Windows 10 need to be wary of “update” phishing scams intent on installing ransomware.
Continue Reading

New Report Shows the Success of Business Email Compromise Come from a Calculated Attack Approach

The newest data from security vendor Barracuda provides insight into exactly how attackers execute BEC attacks and what makes them so successful.
Continue Reading

[Heads-up] Sextortion Crime Gang Now Uses New Tactics To Bypass Your Spam Filters

In a business environment, employees use Google Translate on a regular basis to get access to documents they need to work with, or websites that are in another language.
Continue Reading

Cities and Governments are the Latest Target in a New “Leakware” Attack

This new type of attack focuses on threatening to steal and publish data on the web, asking for a ransom to be paid to keep the attackers from doing so.
Continue Reading

Online Credential Scam Becomes a Phone Port Attack and then Turns into a Sextortion Scam

If experiencing a single cyberattack isn’t enough, this complex attack that shifted mid-stream demonstrates how attackers take advantage of victim details as an attack unfolds.
Continue Reading

FBI Warns U.S. Companies About Maze Ransomware

The FBI is warning U.S. companies about a series of recent ransomware attacks in which the perpetrator, sometimes posing as a government agency, steals data and then encrypts it to ...
Continue Reading

KnowBe4 Has A Blow-Out 2019 Fourth Quarter

In the fourth quarter of 2019, KnowBe4 reached 54% growth over Q4 2018, increasing customer accounts to well over 30,000.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews