Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Smishing and Carrier Impersonation

While most phishing campaigns involve email, SMS text messages are an ideal alternative for attackers, according to Paul Ducklin at Naked Security. Text messages are brief and uniform in ...
Continue Reading

Shipping giant Pitney Bowes hit by ransomware

TechCrunch reported that shipping tech giant Pitney Bowes has confirmed a cyberattack on its systems.
Continue Reading

Alexa and Google Home abused to eavesdrop and phish passwords

Ars Technica is on a roll lately with some very good articles! Here is another one that made me go "Yikes!"
Continue Reading

Can An Employee's Bad Conscience Be A Vulnerability?

It can be useful to remember that social engineering succeeds much better when its marks are stressed or hurried. That appears to be the case with an ongoing scam campaign that lays its ...
Continue Reading

KnowBe4 Wins ComputingSecurity Award: Education and Training Provider of the Year

We are extremely pleased to announce we won the ComputingSecurity Award for Education and Training Provider of the Year. Here is the team accepting the award.
Continue Reading

Don’t Fall Victim to Breach Fatigue

People shouldn’t let news of data breaches dissuade them from trying to protect their information, according to security researcher Ray [REDACTED]. On the CyberWire’s Hacking Human ...
Continue Reading

An Unusually Vile Bit of Social Engineering

A woman in Wales lost £1,000 to a scammer who posed as a police officer and threatened that she would lose her children if she didn’t pay the money within an hour, Wales Online reports. ...
Continue Reading

A Former CIA Officer Shows You How to Make Your Organization a Hard Target

Having spent over a decade as part of the CIA’s Center for Cyber Intelligence and the Counterterrorism Mission Center, Rosa Smothers knows the ins and outs of leading cyber operations ...
Continue Reading

Scam Of The Week: Bogus Performance Review as Phishbait

New phishing attacks are imitating performance appraisals in order to steal employees’ credentials, according to IBM SecurityIntelligence. The attackers are posing as HR employees and ...
Continue Reading

A Lawyer's Look at "Big Game Phishing"

Ransomware attacks have increasingly been going after high-value data in order to extract larger ransoms from victims, according to the well-known law firm Cooley. This trend was ...
Continue Reading

Security Awareness Training is a Key Part of an Effective Cyber Risk Resilience and Prevention Strategy

Organizations investing in cyber security technology and process are expressing risk in economical terms, helping to drive a cost-effective security stance – one that includes training.
Continue Reading

Microsoft Recommends: "Top 6 Email Security Best Practices"... And One Of Them Is Phishing Simulations

Girish Chander, Microsoft's Group Program Manager of Office 365 Security wrote an excellent post on their blog titled "Top 6 email security best practices to protect against phishing ...
Continue Reading

[INFOGRAPHIC] Cost of Ransomware Related Downtime Increased More Than 200 Percent, an Amount 23 Times Greater Than the Ransom Request

Datto, a leading global provider of IT solutions delivered through managed service providers (MSPs), announced its fourth annual Global State of the Channel Ransomware Report. The survey ...
Continue Reading

North Korean Front Company Used to Compromise Mac Users

Suspected North Korean hackers used a front company to spread a malicious cryptocurrency app to both Windows and Mac users, BleepingComputer reports. The APT known as the Lazarus Group ...
Continue Reading

A New Attack Category is Born: You Now Need to Also Worry About Evasive Spear Phishing

Researchers have combed through 25 million emails and found a new method of attack that blends two previously seen attack types combined into a single attack.
Continue Reading

MSPs Should Offer Security Awareness Training as Part of a Complete Security Service Offering

The opportunity to both better secure customers while generating recurring revenue through customer end-user education is ripe for the taking for MSPs focusing on security services.
Continue Reading

What Footballers Wives Can Teach Us About Cybersecurity

Professional football (soccer for my American friends) is big around the world. The English Premier League is among the top in the world, attracting some of the best players, generating ...
Continue Reading

China's Criminal Hacking Spree Created A Boeing Competitor

Crowdstrike just released an explosive report which details the lengths China went to narrow the gap of the technological delta between them and market leaders like Boeing and Airbus.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews