Phishing Kit Uses Custom Font Files to Decode Text
Researchers discovered a phishing template that uses a unique method for encoding text using web fonts. The researchers found that the source code of the landing page contained encoded ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Researchers discovered a phishing template that uses a unique method for encoding text using web fonts. The researchers found that the source code of the landing page contained encoded ...
I'm excited to announce our incredible year-over-year Q4 2018 sales increase, growing more than 60% over Q4 2017's sales, breaking all records, and customer accounts now just under the ...
The U.S. Air Force’s Cyber division used spear-phishing tactics to test whether airmen can proficiently recognize and avoid email-based attacks.
Months after a classic fraud scam took Galveston County for $525,000, County Judge Mark Henry is now asking for the County Auditor and Purchasing Agent to resign.
Without proper security controls, compromising an IoT device is easy work for hackers, giving them access to potentially more than just the device. Let's make it harder for them in 2019!
Someone at Spiceworks asked: "I know there are discussions of Company Phishing Campaigns and Security Awareness Training, curious what everyone uses other than KnowBe4. I have been ...
It was all over the news. A server outage at a major newspaper publishing company on Saturday that prevented the distribution of many leading U.S. newspapers, including the Wall Street ...
Our friends at Malwarebytes wrote: "It’s tough to remember all of the data breaches that happened in 2018. But when you look at the largest and most impactful ones that were reported ...
Researchers at Menlo Labs have spotted and tracked a new campaign aimed at tricking employees of US and UK financial firms and banks into downloading Houdini Malware.
Here's a few important updates to share with you for the month of December!
By Roger Grimes, KnowBe4's Data-driven Defense Evangelist. I’ve been in computer security for over 30-years and I’ve been giving presentations nearly as long. And in that time, no talk ...
If there’s anyone who is close to the pulse of security, it’s Brian Krebs. In one of his recent articles, he discusses how organizations discuss how very important information security ...
A new phishing attack method shows that even the mighty two-factor authentication can be beaten without needing to possess a user’s mobile device.
As part of National Tax Security Awareness Week this month, the IRS notes a surge in phishing scams aimed at stealing money or tax-related data.
The real estate industry is a particularly attractive target for BEC (Business Email Compromise—also known as CEO Fraud—attacks, according to FBI spokesman David Fitz. Fitz told The ...
Email phishing is a top threat to organizations because it works so well, according to Neil Wynne, principal and analyst for secure business enablement at Gartner. Wynne told Stephanie ...
The site safety and credibility represented by the green padlock in your browser is being taken advantage of by cybercriminals looking to lull users into a false sense of security.
By Eric Howes, KnowBe4 Principal Lab Researcher. Now that it's the holiday season, malicious parties across the globe are exploiting Amazon's good name and popularity with consumers to ...