Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

A new ransomware strain called 'Save the Queen’, distributes itself from your own Domain Controllers

Sophisticated cybercriminals have continuously improved the effectiveness of ransomware attacks, according to Yaki Faitelson, co-founder and CEO of Varonis. In an article for Forbes, ...

They're Here! COVID-19 Stimulus Check Phishes Finally Arrive

Last week the FBI warned Americans to be on the look-out for malicious emails attempting to bamboozle users with news surrounding economic fiscal stimulus checks that were to be delivered ...

The Best Computer Security Solvers Look Beyond the Problem

Who doesn’t love a good computer security “cowboy”? That’s a man or a woman who is a recognized authority in their field of expertise, who groks their subject, who is truly a subject ...

Sextortion Email Scams Now Include Threats to Infect Victims with COVID-19

In what may be either a moment of brilliance or desperation, scammers are attempting to use coronavirus infection threats as a means of further convincing victims to pay up.

New Potential Phishing Scam Begins with A Phone Call

A recent suspicious phone call was brought to our attention. It looks to be the beginning of a phishing campaign and demonstrates the lengths cybercriminals will go to in order to ensure ...

70% to 90% of All Malicious Breaches are Due to Social Engineering and Phishing Attacks

If you’ve heard me speak the last two years, read any of my articles, or watched any of my webinars, you’ve probably heard me say, “Seventy to ninety percent of all malicious breaches are ...

The Dilemma: Should you phish test during the COVID-19 pandemic?

By Perry Carpenter, KnowBe4 Chief Evangelist and Strategy Officer. There’s no question, these are challenging times. Employees and organizations around the world are doing their best to ...

An Uber Phish

London's Transport for London (TfL) is the entity that manages public transportation and public carriage licenses. In November 2019, TfL stated it would not renew Uber’s Private Hire ...

Trends in Phishing, as Seen From a Mountain View

Researchers from Google’s Threat Analysis Group (TAG) released details on recent state-sponsored phishing campaigns from around the world. The researchers said that Google’s phishing ...

Who Doesn’t Like Free Money? Scammers Are Expected to Increase Use of the COVID Stimulus Bill to Line their Pockets

With cybercriminals loving to be able to target victims where money is directly involved, security experts are anticipating a massive uptick in Stimulus-related scams.

Bad Guys Push New COVID-19 Message: You Are Infected

Malicious actors continue to craft ruthlessly aggressive, evil email attacks tailored to leverage mounting fears and anxieties surrounding the COVID-19 outbreak in the United States among ...

New Video Module "Covid-19 Best Practices" from KnowBe4 and Transperfect

Here is a quick announcement!

The Paradox of Perfection

One of the challenges with living in a hyper-connected world is that it’s easy for anyone to stand on a soapbox and point out when something is wrong.

Hospitality Provider the Target of an Old-School BadUSB Social Engineering Attack

In what appears to be a mix of old- and new-school social engineering, an attack spotted in the wild using a USB thumb drive offers us a view into how one company could have become the ...

Scammers Hijacking Twitter Accounts To Sell Face Masks

Scammers cashing in on the Coronavirus crisis are now hijacking Twitter accounts to heavily promote a web site purporting to sell face masks, respirators, digital thermometers, and toilet ...

The Creation & Development of a COVID-19 Phish

As we documented in a recent blog piece, malicious actors are aggressively exploiting the COVID-19 crisis by re-purposing and overhauling phishing emails they were running before the ...

Inception: Your Employee's Mind is the Scene of the Crime

I loved the movie Inception when it came out. It had everything, a stellar cast, amazing visuals, a strong plot, and a twisted end that still has me wondering whether or not they were in ...

Every Computer Defense Has Three Main Pillars

Defense-in-Depth is a dogmatic term used in the computer defense industry to indicate that every computer defense has to be made up of multiple, overlapping defenses positioned to best ...

[HEADS UP] Cybercriminals Attempt to Exploit Stimulus Package for COVID-19

In several recent blog posts we've showed you the myriad ways in which malicious actors have aggressively -- even ruthlessly -- deployed social engineering tactics to leverage the ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.