Phishing from Beyond the Grave...
By Eric Howes, KnowBe4 Principal Lab Researcher. It's no secret that the threat of phishing emails has been growing at an alarming rate for a number of years. Indeed, ZDNet recently ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
By Eric Howes, KnowBe4 Principal Lab Researcher. It's no secret that the threat of phishing emails has been growing at an alarming rate for a number of years. Indeed, ZDNet recently ...
World’s largest library of security awareness training recognized for excellence
How Fast Can Your Domain Admin Password Be Cracked? 19% of employees of small and medium-sized businesses (SMBs) share their passwords with coworkers, according to a study by Switchfast. ...
Red teaming starts with research. So does social engineering. Red teaming is the practice of thinking and acting like an attacker to test an organization’s defenses, according to security ...
When you think of cyber-espionage, you might be surprised it’s far less “Mission: Impossible” and a lot more basic phishing tactics.
Cybercriminals are already looking to take advantage of the 2020 Tokyo Olympics. Are you thinking years out? The bad guys are.
Students from Plattsburgh State and SUNY Adirondack were targeted by several types of scams over the summer, causing Plattsburgh State officials to send out warnings to the student body. ...
And just one mistake can compromise an entire organisation. Danny Palmer at ZDNet wrote: "One in every one hundred emails sent round the globe has malicious intent, likely to deliver ...
If you ever wondered if those iTunes gift card phishes really work, see the below email exchange.
Just in time before October's Cybersecurity Awareness Month, DomainTools released its second annual Cybersecurity Report Card in which infosec pros were surveyed about their security ...
The Korea JoonGang Daily reported that despite warnings from financial authorities, an average of 116 people fall victim to what is called "voice phishing" scams every day in Korea.
Dealing with business email compromise (BEC) requires people, process, and technology. As we've noted before, the problem is growing. Harder to detect and evolving in sophistication, ...
The Necurs botnet – most notably responsible for distributing Locky – is now pushing weaponized internet or web query (.IQY) file to evade detection and download malware.
This latest statistic takes the spotlight off of antivirus as the protector, and puts the focus squarely in the hands of your users to stop attacks.
This latest story about one specific cybercriminal group shows how even the most trusted of white-hats can give in to the lure of financial profit, following Evgeniy Bogachev who retired ...
By Perry Carpenter, KnowBe4 Chief Evangelist and Strategy Officer. I’m a bit of an oddball when it comes to the security awareness market in that I’ve seen it from virtually every ...
KnowBe4 is running its Inaugural 2018 Security Awareness Training Deployment Trends and Usage Survey.
When you become the worldwide No.1 player in your field with tens of thousands of organizations using your platform, you get on people's radar. Both the good guys and the bad apples.
Lloyds Bank says that Business Email Compromise (BEC)—also known as CEO Fraud—rose by 58% in the UK over the past year. While BEC is often associated by the media with large firms, ...