Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

8-Character Windows NTLM Passwords Can Be Cracked In Under 2.5 Hours

BeauHD posted in Slashdot: "HashCat, an open-source password recovery tool, can now crack an eight-character Windows NTLM password hash in less than 2.5 hours. "Current password cracking ...

Iran indictments show even U.S. intelligence officials are vulnerable to basic phishing schemes

As the story broke about the charges against former U.S. Air Force intelligence specialist who defected to Iran and support targeted hacking against some of her former colleagues, one ...

U.S. Cities Remain at Risk of Cyber Attacks

Recent attacks on city governments have not only provided their attackers with revenue from scams, data breaches, and data held ransom, but have also drawn the attention of other ...

Business Email Compromise, Credential Theft, and Many Other Attack Vectors Surged as High as 5x in Q4 2018

The latest data from Proofpoint shows many types of cyberattacks making massive jumps in comparison to both previous quarters and years.

Cyberheist On Bank Causes Shutdown Of All Operations

Reuters reported that the Bank of Valetta, which accounts for almost half of Malta’s banking transactions, had to shut down all of its operations on Wednesday after hackers broke into its ...

New York State Education Department Proposes New Regulations to Strengthen PII Security

The new proposed amendments seek to protect the personally identifiable information for students and school personnel accessible by both educational agencies and contractors.

Bogus Security Alerts Aren’t From Norton

Con artists are targeting thousands of people with tech support scams that pose as security alerts from Norton Security, researchers at Symantec have found. The phony alerts pop up in the ...

Surge in Email-enabled Healthcare Fraud

Email fraud targeting healthcare professionals has spiked 453% over the past two years, according to a new report by Proofpoint. Proofpoint researchers tracked business email compromise ...

Company Sues Employee After She Falls For USD 250K CEO Fraud Scam

A woman is being sued for sending approx. 250K of her employer's cash to an online fraudster. Patricia Reilly, who was working for the UK Peebles Media Group fell for a CEO Fraud Scam ...

You Have A Special Valentine's Day Message!

Another Home Buyer Falls Victim to a Business Email Compromise Scam

A man in Portland, Oregon lost $123,000 after falling victim to a real-estate scam, according to Michele Lerner at The Washington Post. In December, Aaron Cole and his family were about ...

Massive Increases in Trojans and Backdoor Attacks More Than Double, Spelling Trouble for Organizations

Growth in attacks designed to obfuscate access and purpose should put organizations on alert as cybercriminals gain control over endpoints to do just about anything they want.

One-Third of Organizations Aren’t Ready to Combat Cybersecurity Attacks, Despite Increases in Security Spend

The latest data from eSecurityPlanet highlights that organizations have a lot of work to do to ensure they are secure in the face of a shortage of cybersecurity professionals.

New Phishing Attack Uses Google Translate to Spoof Login Page and Fool Victims

A clever use of Google Translate fools victims into believing spoofed authentication requests are being handled by Google itself.

Data Breaches Result in Lost Customer Confidence Costing Organizations More than Just Fines

Consumers have spoken: According to new data, the majority of your organization’s customers won’t do business with you after a data breach and expect you to pay to protect their personal ...

[On-demand Webinar] Get an Insider View Into the Methods and Exploits of the World's Most Famous Hacker, Kevin Mitnick

Many of the world's most reputable organizations rely on Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, to uncover their most dangerous security flaws. ...

Scammers Still Exploit Hijacked GoDaddy Domains

Criminals are still using hijacked GoDaddy domains to launch large-scale spam campaigns, despite GoDaddy taking steps last month to address the authentication flaw exploited by the ...

A Majority of Cyberattacks Use Lateral Movement and “Living Off the Land”

The latest from Carbon Black’s 2019 Global Threat Report shows cybercriminals are intent to move from endpoint to endpoint and avoid detection using built-in tools.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.