Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Why Do Organizations Still Under-report Cybercrime?

It’s estimated that organizations aren’t engaging with Law Enforcement when becoming a victim of a cybercrime in large numbers. We cover 5 reasons why organizations don’t.

New Survey Uncovers Primary Challenges in Creating A Security Culture

New survey data from security vendor nCipher uncovers why organizations are finding it difficult to engage users to participate willingly in security-minded processes and behaviors.

The Fake French Minister In A Silicone Mask Who Stole Millions

Identity theft is said to be the world's fastest-growing crime, but in sheer chutzpah there can be few cons to match the story of the fake French minister and his silicone mask.

Maryland governor signs order to boost cybersecurity after Baltimore ransomware attack

The Hill reported: "Maryland Gov. Larry Hogan (R) on Tuesday signed an executive order aimed at strengthening the state’s cybersecurity capabilities, a month after a debilitating ...

Bogus Emails: 3.4 Billion Are Sent Every Day...

Research from Valimail shows that at least 3.4 billion phony emails are sent every day, Help Net Security reports. Despite this staggering number, most organizations still aren’t ...

How Hackers Emptied Church Coffers with a Phishing Attack and Social Engineering Phone Call

Cyber thieves aren't bound by a code of ethics. They look for weak targets and high rewards, which is exactly what Saint Ambrose Catholic offered.

Massive Cyberheist Bankrupts Medical Debt Collector

AMCA, a medical billing collections agency that was hacked last year in an incident believed to impact millions of medical patients is now seeking a federal bankruptcy court’s protection ...

Hit by Ransomware Attack, Florida City Agrees to Pay Hackers $600,000

It was all over the press, and even made it in the New York Times: "The leaders of Riviera Beach, Fla., looking weary, met quietly this week for an extraordinary vote to pay nearly ...

[NEW FEATURES] Branded Certificates and End User Surveys

We are excited to announce the release of two new features in the KnowBe4 platform. Branded Certificates and End User Training Surveys!

Subdomain Scam Hits Australian Government Seeking Money to “Register” Bogus Domain Names

Employees of agencies within the Australian government have been receiving targeted emails offering to register what amounts to a subdomain of a legitimate look-alike domain.

U.S. May Face Cyberwar with Russia After Purported U.S. Attacks on Russian Power Grid

The hacking of Russia’s power grid by the U.S. has led to a formal warning from the Kremlin that could escalate into an all-out cyberwar with attacks on U.S. businesses, agencies, and ...

“File Deletion” Alert Becomes the Latest Scam to Compromise Office 365 Credentials

Attackers use simple cause for concern as the basis of a scam intent on tricking victims into offering up their Office 365 credentials.

Two-Thirds of Organizations See an Increase in Impersonation Attacks

Nothing fools a user like an email seemingly from someone they know. And, according to the latest data from Mimecast, the bad guys are stepping up their impersonation game.

Ransomware Halts Production For Days At Major Airplane Parts Manufacturer

As a result of having IT systems crippled by the ransomware infection, the company has sent home approximately 1,000 of its 1,400 workers on paid leave.

Voicemail Phishing Scam Steals Credentials

A new phishing campaign is asking victims to click on a link in an email to download a voicemail, My Online Security reports. When recipients click on the link, they’ll be redirected to a ...

FBI’s Advice on Spotting Phishing

The FBI’s Internet Crime Complaint Center (IC3) released a PSA warning that attackers are exploiting people’s trust in sites that use HTTPS. Cybersecurity training has in the past rightly ...

Social Engineering is at the Root of Nearly all Fraud Attacks

According to the latest fraud report from RSA, all four of the documented fraud attack methods use some form of social engineering to trick victims into giving up their money.

Case Law Continues to Define the Extent to Which Cyber Insurance Must Cover Losses

Several new cases show the evolution of case law that demonstrates what both cyber insurers and policyholders alike can expect from the courts.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.