[VIDEO] Brand New KnowBe4 "Behind The Scenes"
Here's some brand new footage about KnowBe4 and how things look behind the scenes ! October 2018, Our Series A Venture Capital investor Elephant Partners asked us if it was OK to shoot ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Here's some brand new footage about KnowBe4 and how things look behind the scenes ! October 2018, Our Series A Venture Capital investor Elephant Partners asked us if it was OK to shoot ...
SecurityWeek reported about a Palo Alto Networks warning: "A malicious group known as the “Inception” attackers has been using a year-old Office exploit and a new backdoor in recent ...
A new variant of ransomware, CommonRansom, is asking for RDP access to the victim’s computer in order to decrypt files. CommonRansom is the latest attempt to extend the ransomware attack ...
We've seen this before, and it's worth noting again. A tweet from a blue-checked Elon Musk is all it takes to set a Bitcoin giveaway frenzy into motion. The only problem is that it’s just ...
According to ISACA and the CMMI Institute, organizations continue to invest heavily in security technology while neglecting security training to create the appropriate corporate culture.
We've blogged about other recent studies of security. They're in substantial agreement. Here's one from Gemalto, and it reports that more than 4.5 billion digital records, each with an ...
A 65-year-old woman from North Carolina, Roxanne Reed, is in jail for allegedly plotting to kill her mother for the insurance money. Roxanne Reed had swallowed a catphishing scam, one in ...
The latest data from CSO’s 2018 U.S. State of Cybercrime report highlights the risk users create, and how little organizations are doing to address it.
Compromised websites focused on tomorrow’s midterm elections serve as the hunting ground for cybercriminals looking to take advantage of unsuspecting visitors.
The average American cannot reliably distinguish between fake and legitimate election campaign emails, according to a study by Valimail. In the weeks leading up to the US midterm ...
This is an excellent opportunity to sit down with your young'uns and explain the risks of online scams.
Cybercriminals don’t want to be caught, so after a data breach, they use unsuspecting people as “mules” to launder money using a sophisticated shipping scam.
Our friends at Malwarebytes reported that a malware strain similar in nature to Stuxnet—but more aggressive and sophisticated—allegedly hit the infrastructure and strategic networks in ...
What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about ...
Pretexting attacks are a growing threat to organizations, warn Chris Tappin and Simon Ezard from the Verizon Threat Research Advisory Centre. Verizon’s 2018 Digital Breach Investigation ...
A phishing scam is using fake login pages to target League of Legends players, according to Avast Blog. At the moment, the attacks are taking place primarily in western Europe, mainly ...
Howard, KnowBe4's HackBusters Discussion Forum Moderator reported on this very interesting phone call he got:
By Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist. Microsoft recently announced a big update to their Microsoft Office 365 (O365) anti-phishing technical capabilities. ...
According to a new survey, social media sharing – and oversharing – provides cybercriminals with important personal details to commit identity theft, fraud, and more.