Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

What's Wrong With The New Bill That Proposes Cyber Security Training for U.S. House Members?

A bill introduced last week requires all members, officers and employees of the U.S. House of Representatives to undergo cybersecurity training.

InfraGard Recommends User Education

Education is crucial in defending against evolving social engineering attacks, according to Jack Plaxe, president of the Kentucky InfraGard Alliance. During a presentation last week, ...

Phishing Attacks Top Verizon’s List of Threat Actions Used in Data Breaches

Verizon’s latest Data Breach Investigations Report provides valuable insight into exactly how attacks are carried out, what tactics are working, and how users are helping.

[Heads-Up] If This Is True It's A Disaster. Three Major US Antivirus Companies Breached? ***UPDATED

ARSTECHNICA is getting me worried here. We were all at KB4-CON in Orlando the last few days, and during the conference word got to me that security researchers found out that high-profile ...

[Spoiler!] That Free Avengers: Endgame Download You Found Online? It’s a Scam!

The lure of watching the latest Avengers movie is enough motivation for some to fall for this scam aimed at collecting your credit card data.

Half of SMBs Will Pay the Ransom in a Ransomware Attack

Despite the ability to properly protect against ransomware attacks, the latest data from AppRiver shows SMBs simply aren’t prepared to respond, and will, instead, pay up.

Phishing Continues to Rise as Attacks Go Malwareless

Cybercriminals seem to be honing their craft, picking specific attack types, victim demographics, and methods, according to new data from the latest PhishLab’s report.

Half of all 2020 Presidential Candidates are Susceptible to Impersonation Attacks

Recent analysis of the websites of 16 current presidential candidates indicate insufficient security to stop attackers from sending emails out impersonating the campaign.

Russian cyberspies are using one hell of a clever Microsoft Exchange backdoor

A Russian cyber-espionage group has developed and has been using one of the most complex backdoors ever spotted on an email server, according to new research published by cyber-security ...

Deepfake Videos – An Increasing Cyber Threat For Corporate Clients

Insurance Business Mag had an interesting take on your users being the victim of social engineering by deepfakes. Your cyber insurance policy is not likely to pay out in cases like this. ...

KnowBe4 Fresh Content & Features Updates - April 2019

Check out the content and feature updates in the KnowBe4 platform for the month of April! NEW FEATURED CONTENT - STANDUPS 4 SECURITY We’re excited to highlight the release of the new ...

Great Budget Ammo: 60 minutes Warns Against Ransomware

We could not have said it better ourselves, but now 60 minutes has done the work for us. This is probably the best ammo you can send to your non-tech executives to explain the ransomware ...

Nearly Half of US Orgs Not Ready for California Consumer Privacy Act Deadline

InfoSec Mag observed something a bit worrisome. "In advance of the California Consumer Privacy Act (CCPA) going into effect January 1, 2020, researchers analyzed how prepared US ...

IT and Executives are (Mostly) in Alignment and Both Fear the Phish

According to the latest from AT&T Cybersecurity, enterprise IT and boardrooms largely see eye-to-eye… and those eyes are watching some very common, yet pervasive, threats.

U.K. Court Finds Employee Actions Constitute “Vicarious Liability”, despite meeting GDPR Requirements

The latest developments in the lawsuit against UK supermarket chain Morrisons may dictate the future of employers being held responsible for employee actions.

[Heads-up] Scary New MegaCortex Ransomware Strain Discovered That Targets Your Business Network

Sophos has discovered a scary new strain of very sophisticated ransomware called MegaCortex. It was purpose-built to target corporate networks, and once penetrated, the attackers infect ...

Exploiting Google on the Cheap

By Eric Howes, KnowBe4 Principal Lab Researcher. So, maybe you're a bad guy who doesn't have fancy code monkeys who can cook up an exploit that effectively converts Google into a phishing ...

61% Of IT Pros Have Experienced A Serious Data Breach And Many Are Blamed For It.

TechRepublic just reported that cybercriminals continue to target intellectual property, putting companies at risk for financial and brand reputation hits, quoting a new McAfee report.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.