Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

8-Character Windows NTLM Passwords Can Be Cracked In Under 2.5 Hours

BeauHD posted in Slashdot: "HashCat, an open-source password recovery tool, can now crack an eight-character Windows NTLM password hash in less than 2.5 hours. "Current password cracking ...
Continue Reading

Iran indictments show even U.S. intelligence officials are vulnerable to basic phishing schemes

As the story broke about the charges against former U.S. Air Force intelligence specialist who defected to Iran and support targeted hacking against some of her former colleagues, one ...
Continue Reading

U.S. Cities Remain at Risk of Cyber Attacks

Recent attacks on city governments have not only provided their attackers with revenue from scams, data breaches, and data held ransom, but have also drawn the attention of other ...
Continue Reading

Business Email Compromise, Credential Theft, and Many Other Attack Vectors Surged as High as 5x in Q4 2018

The latest data from Proofpoint shows many types of cyberattacks making massive jumps in comparison to both previous quarters and years.
Continue Reading

Cyberheist On Bank Causes Shutdown Of All Operations

Reuters reported that the Bank of Valetta, which accounts for almost half of Malta’s banking transactions, had to shut down all of its operations on Wednesday after hackers broke into its ...
Continue Reading

New York State Education Department Proposes New Regulations to Strengthen PII Security

The new proposed amendments seek to protect the personally identifiable information for students and school personnel accessible by both educational agencies and contractors.
Continue Reading

Bogus Security Alerts Aren’t From Norton

Con artists are targeting thousands of people with tech support scams that pose as security alerts from Norton Security, researchers at Symantec have found. The phony alerts pop up in the ...
Continue Reading

Surge in Email-enabled Healthcare Fraud

Email fraud targeting healthcare professionals has spiked 453% over the past two years, according to a new report by Proofpoint. Proofpoint researchers tracked business email compromise ...
Continue Reading

Company Sues Employee After She Falls For USD 250K CEO Fraud Scam

A woman is being sued for sending approx. 250K of her employer's cash to an online fraudster. Patricia Reilly, who was working for the UK Peebles Media Group fell for a CEO Fraud Scam ...
Continue Reading

You Have A Special Valentine's Day Message!

Continue Reading

Another Home Buyer Falls Victim to a Business Email Compromise Scam

A man in Portland, Oregon lost $123,000 after falling victim to a real-estate scam, according to Michele Lerner at The Washington Post. In December, Aaron Cole and his family were about ...
Continue Reading

Massive Increases in Trojans and Backdoor Attacks More Than Double, Spelling Trouble for Organizations

Growth in attacks designed to obfuscate access and purpose should put organizations on alert as cybercriminals gain control over endpoints to do just about anything they want.
Continue Reading

One-Third of Organizations Aren’t Ready to Combat Cybersecurity Attacks, Despite Increases in Security Spend

The latest data from eSecurityPlanet highlights that organizations have a lot of work to do to ensure they are secure in the face of a shortage of cybersecurity professionals.
Continue Reading

New Phishing Attack Uses Google Translate to Spoof Login Page and Fool Victims

A clever use of Google Translate fools victims into believing spoofed authentication requests are being handled by Google itself.
Continue Reading

Data Breaches Result in Lost Customer Confidence Costing Organizations More than Just Fines

Consumers have spoken: According to new data, the majority of your organization’s customers won’t do business with you after a data breach and expect you to pay to protect their personal ...
Continue Reading

[On-demand Webinar] Get an Insider View Into the Methods and Exploits of the World's Most Famous Hacker, Kevin Mitnick

Many of the world's most reputable organizations rely on Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, to uncover their most dangerous security flaws. ...
Continue Reading

Scammers Still Exploit Hijacked GoDaddy Domains

Criminals are still using hijacked GoDaddy domains to launch large-scale spam campaigns, despite GoDaddy taking steps last month to address the authentication flaw exploited by the ...
Continue Reading

A Majority of Cyberattacks Use Lateral Movement and “Living Off the Land”

The latest from Carbon Black’s 2019 Global Threat Report shows cybercriminals are intent to move from endpoint to endpoint and avoid detection using built-in tools.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews