Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Trojan Phishing Attacks By North Korean Hackers Are Attempting To Steal Bitcoin

Researchers at Secureworks report Trojan malware is being distributed in phishing emails using the lure of a fake job ad. A prolific cyber criminal gang with links to North Korea is ...

Email Security Gap Analysis Shows 10.5% Miss Rate

Aggregated results show 10.5% average rates at which enterprise email security systems miss spam, phishing and malware attachments. Here is a summary of findings of email security systems ...

[On-Demand Webinar] Counter the Careless Click: Tools to help you train your users

Cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Employee training is tied as the third-most-effective method (higher than antivirus) of ...

Cyberheists Linked to Russian Hackers Targets Banks From Moscow to Utah

A previously unknown ring of Russian-speaking hackers has stolen as much as $10 million from U.S. and Russian banks in the last 18 months, according to a Moscow-based cyber-security firm ...

Basic training in avoiding phishing is no longer sufficient

Databreaches.net has forums and one of their posts really got our attention. It was an official notification from the legal department of Boise Cascade Company in Utah about a phishing ...

This ransomware asks victims to name their own price to get their files back

Attackers behind this form of file-encrypting malware - which has similarities with Locky - think that if the victim can set their own price, they're more likely to pay. A form of ...

48 Servers Of North Carolina County Held Hostage by LockCrypt Ransomware

A hacker’s 1 p.m. deadline to pay $23,000 passed Wednesday, and Mecklenburg County has not decided whether to pay the ransom for a cyber-attack that “paralyzed” the county. County manager ...

Cyber Warfare in 140 Characters: Social Media Weaponized

David Patriakos's new book about cyber warfare is a fascinating read. From the back cover: "Modern warfare is a war of narratives, where bullets are fired both physically and virtually. ...

KnowBe4 Prevents Customer From Becoming Social Engineering Victim Of Duke Energy Vendor’s Hack

A customer just sent us this: "Stu, the company who processes payments for Duke Energy’s walk in payments was hacked and as a result about 375,000 bank accounts may have been stolen. "We ...

Which of Your Employees Are Most Likely to Expose Your Company to a Cyber Attack?

Kon Leong at Harvard Business Review wrote an excellent article about the problem of employees exposing your organization to cyberthreats through human error. Here is a short qoute:

Phishing Schemes Are Using Encrypted Sites To Seem Legit

WIRED wrote: "A MASSIVE EFFORT to encrypt web traffic over the last few years has made green padlocks and "https" addresses increasingly common; more than half the web now uses internet ...

Mailsploit Bypasses DMARC And Lets Attackers Send Spoofed Phishing Emails on Over 33 Email Clients

Our friends at Bleepingcomputer reported on something that should cause anyone concern. German security researcher Sabri Haddouche has discovered a set of vulnerabilities that he ...

KnowBe4 Wins Frost & Sullivan Cyber Security Awareness Training Platform Customer Value Leadership Award

I'm extremely pleased to tell you we have won a prestigious award. Frost & Sullivan is a global research and consulting firm and they recently announced that we received their 2017 ...

Scam Of The Week: Phishers Target PayPal Users With Fake “Failed Transaction” Emails

Scammers are pushing out fake PayPal emails that use the premise of an unverified transaction to phish for customers’ personal and financial information. With the end-of-the-year holidays ...

Your Cybercrime Insurance Policy May Not Cover You For Social Engineering Fraud

I have talked about this potentially extremely expensive and very disappointing "CEO fraud" or "Business Email Compromise" problem many times before. Your cybercrime policy may not ...

Phishing campaigns and malware infections are both up more than 40% since Q2 ‘17

The NTT Security Global Threat Intelligence Center (GTIC) 2017 Q3 Threat Intelligence Report provides a glimpse inside the research conducted by NTT Security researchers over the last ...

Google Kicks Harmful Apps Out Of Google Play And Offers 5 Steps Against Social Engineering

You're always better off getting apps from reputable stores like Google Play than you are from potentially dodgy, at best unknown, third-party sites. But even Google Play isn't immune ...

If Willie Sutton were working today, he'd be stealing cryptocurrency, not wasting time on banks

Because that's where the money is. Criminals have been installing cryptocurrency miners on victim machines that turn them into sources of money. These operate without the users' ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.