Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

GCSE coursework lost in ransomware attack on UK Bridport school

Hackers have used ransomware to encrypt files at a school, causing it to lose some students' GCSE coursework.
Continue Reading

Credentials and Personal Data Continue to be the Primary Targets of Social Engineering Scams

Targeted attacks are increasing, with cybercriminals focused on stealing information that can be used to impersonate a user and perpetuate their scams.
Continue Reading

Ransoms are Becoming More Expensive While Ransomware Attacks Become More Damaging

Ransomware isn’t going anywhere, and cybercriminals are stepping up their game increasing payments while also targeting backups more often to improve their chances of payment.
Continue Reading

[On-demand Webinar] 5 IT Security Myths Your CISO Believes are True… BUSTED!

Facts are facts… but what happens when IT security pros take myths at face value? That got us thinking… what if we whip out our magnifying glasses, pull out the trench coats and use our ...
Continue Reading

Matrix Ransomware Uses a “Swiss Army Knife” of Tools to Infect, Compromise, and Spread

Since the days of EternalBlue, we’ve been concerned with malware spreading within a network. The latest iterations of Matrix Ransomware use a sophisticated list of embedded tools to do ...
Continue Reading

Passwords and Their Encryption Are Easy Prey for Cyber Criminals in Account Takeover Attacks

Passwords serve as the foundation for most security today. But security vendor SpyCloud have recovered over 3.5 billion credentials, demonstrating just how insecure they really are.
Continue Reading

[Heads up] Ransomware V2.0 Is Set to Resurge As Your Insurance Now Pays Off The Ransom

Holy Smokes! Ransomware may be poised to return as a top scourge for companies, as more and more of them pay up—it's actually their insurance company that makes the payment—after an ...
Continue Reading

Triton is the world’s most murderous malware, and it’s spreading

In the summer of 2017, a petrochemical plant in Saudi Arabia experienced a worrisome security incident that cybersecurity experts consider to be the first-ever cyber attack carried out ...
Continue Reading

Negative Reviews as Strong-Arm Collection for Bogus Bills

Anyone who depends upon good public opinion can be vulnerable to orchestrated bad word-of-mouth, especially in the form of online reviews.
Continue Reading

RSA’s Best Social Engineering News

KnowBe4 was at RSA 2019 this year with two booths, in both the North and South Hall. The show was humongous as usual and a torrent of news was released. I was there and it was a challenge ...
Continue Reading

Georgia county pays a whopping $400,000 to get rid of a ransomware infection

Officials in Jackson County, Georgia, paid $400,000 to cyber-criminals this week to get rid of a ransomware infection and regain access to their IT systems. The County hired ...
Continue Reading

809 Million Records Exposed By Email Marketing Giant. No Bueno.

I'm suffering from Data Breach Fatigue, how about you?
Continue Reading

Cyber Criminals use Domino Effect Chain Attacks to Leverage One Compromised Bank to Infect the Next

New details from international security company Group-IB show how cybercriminals are no longer looking to just steal from one bank. Instead they chain their attacks to improve their ...
Continue Reading

60% of Organizations Have No CSO or CISO, Putting Network Security at Risk

Recent data from Check Point Security’s Cyber Talk shows organizations are massively unprepared for attacks on network, mobile, and physical security.
Continue Reading

Rietspoof Malware Attack Uses Messaging Apps to Distribute Ransomware

Researchers at antivirus vendor Avast have identified a new malware attack that leverages Skype, Facebook Messenger, and other messaging applications.
Continue Reading

Malware Blindness in the Enterprise

A growing percentage of cyberattacks are using encryption to avoid detection, according to a new report by Zscaler’s ThreatLabZ researchers. Their report, summarized by Help Net Security, ...
Continue Reading

Ins and Outs of Impersonation...and Kidnapping

Impersonation attacks and business email compromise (aka CEO fraud) can lead to far more dangerous consequences than monetary losses, according to Matt Devost from OODA LLC. Devost ...
Continue Reading

KnowBe4 Technical Content Team Produces Tons Of Cool Stuff

I thought you might want to have an update on what kinds of content the KnowBe4's Technical Content team has been producing lately. (The picture here is Katie, our Technical Content ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews