Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

North Korean Front Company Used to Compromise Mac Users

Suspected North Korean hackers used a front company to spread a malicious cryptocurrency app to both Windows and Mac users, BleepingComputer reports. The APT known as the Lazarus Group ...

A New Attack Category is Born: You Now Need to Also Worry About Evasive Spear Phishing

Researchers have combed through 25 million emails and found a new method of attack that blends two previously seen attack types combined into a single attack.

MSPs Should Offer Security Awareness Training as Part of a Complete Security Service Offering

The opportunity to both better secure customers while generating recurring revenue through customer end-user education is ripe for the taking for MSPs focusing on security services.

What Footballers Wives Can Teach Us About Cybersecurity

Professional football (soccer for my American friends) is big around the world. The English Premier League is among the top in the world, attracting some of the best players, generating ...

China's Criminal Hacking Spree Created A Boeing Competitor

Crowdstrike just released an explosive report which details the lengths China went to narrow the gap of the technological delta between them and market leaders like Boeing and Airbus.

I Can Phish Anyone

I’m a bit surprised by some aggressive corporate anti-phishing policies which say they will fire anyone for one accidental phishing offense. Send me the names and email addresses of the ...

CRN: "Kevin Mandia -- Detect Spear Phishing, Lock Down CEO Email To Stay Safe"

Michael Novinson at CRN had a great article that really explains the issues we are dealing with. He started out with: "Spear phishing remains the most common way for adversaries to ...

Simjacking is Still a Problem, British Food Writer Lost £5,000

British food writer Jack Monroe lost £5,000 due to a simjacking attack, the BBC reports. In a series of tweets, Monroe said someone had taken over her phone number and used the access to ...

It’s Baaaaaaaack! Emotet Trojan Rears Its Ugly Head Once Again After a 3-Month Vacation

One of the most dangerous pieces of malware to-date, this trojan-turned-botnet has come back after a brief hiatus and appears to be a part of a new spear phishing campaign targeting ...

Cyber Risk Remains a Top Concern for Organizations While Lacking Confidence in Addressing Cyber Threats

It appears priority and ability to execute are two very different things when it comes to dealing with cyber threats, according to the latest data from Marsh and Microsoft.

Extremely Embarrassing 250,000-record Data Breach At Hookers.nl

The data of 250,000 users of Hookers.nl, a forum where experiences with prostitutes and escorts are exchanged, have been stolen and offered for sale on the internet. It concerns e-mail ...

Why Hack When You Can Con?

Organizations Experiencing Attacks Rises by 35% as Most Consider Themselves Cyber-Novices

An increase in attacks should equate to a rise in organizational cyber-preparedness. But according to new research from U.K. cyber insurer Hiscox, organizations simply aren’t ready.

U.S. Organizations Involved with Nuclear Deterrence are the Target of North Korean Phishing Attacks

Using some very sophisticated methods, the Kimsuky group is believed to be behind a spear phishing campaign aimed at stealing U.S. secrets.

[PODCAST] Understanding Social Engineering and Maintaining Healthy Paranoia

Recorded Future's Guest today was Rosa Smothers, senior vice president of cyber operations at KnowBe4, where she leads KnowBe4’s federal practice efforts, including providing ...

Virtual Hard Disk Images Containing Malware Are Ignored by Windows and Antivirus Engines

This disturbing find by a CERT researcher demonstrates how attackers can encode malicious files within a Virtual Hard Disk (VHD) image that acts in the same way as a ZIP archive.

Universities Worldwide are the Target of Phishing Attacks by a Hacking Group Aimed at Stealing Research and Intellectual Property

The Iranian hacker group dubbed Colbalt Dickens has hit over 60 universities around the globe attempting to steal credentials to provide access to sensitive data.

Many in Utilities Sector Expect Attacks on Critical Infrastructure: Survey

Ed Kovacs at SecurityWeek reported on something that is one of the few things that keep me "awake at night":

"Staggering" Increase in Business Email Compromise--aka CEO Fraud

Mimecast’s quarterly Email Security Risk Assessment (ESRA) identified millions of dangerous emails making it through security filters, including a 269% increase in business email ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.