Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Microsoft Wakes Up To The Fact That Cyber Security Risk Is A Business Risk [VIDEO]

The 800-pound Redmond Gorilla asks: "Should your security focus be on systems or people?" They wrote: "In the latest Modern Workplace episode, “Cyber Intelligence—The Human Element,” we ...

Enigma Hacked Before ICO Date -- CEO Had Not Changed A Compromised Password

Wherever there’s a lot of money to be made cyber thieves are not far behind. Think sharks surrounding a bait ball. Enigma is a financial data marketplace founded by a team from MIT which ...

Inside The New York Hospital That Was Down For 6 Weeks Due To Ransomware

If you ever needed ammo to convince budget holders that you need more IT security resources, this is the link to send them. It is a great discussion-starter how an attack like this would ...

[On-Demand Webinar] How To Phish Like the Bad Guys

Despite all the spectacular news stories about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to ...

SyncCrypt Uses Graphic File to Cloak Ransomware in ZIP Phishing Payload

Emisoft Security researcher xXToffeeXx discovered another new phishing threat adept at bypassing Antivirus using a variation of the game played by PowerPoint PPSX attachment phishing ...

Criminals Use Social Engineering To Make Victims Install Malicious Chrome Extensions

The attackers did reconnaissance on their targets, using social networks which people inside the organization were involved in making financial transactions. These victims were then ...

Here Is A Cool And Useful INFOGRAPHIC About Social Engineering

Kevin Mitnick, KnowBe4's Chief Hacking Officer retweeted a link to well-executed infographic about Social Engineering, and here it is, courtesy of the team at Smartfile.com

New Study: Phishing Is Still The Top Threat Faced By Organizations

The new 2017 SANS Threat Landscape survey from the well-known research and education specialist finds that security professionals rate phishing at 72 percent, spyware at 50 percent, ...

Ukrainian Coder May Be First Potential Witness of DNC Phishing Attack

A lengthy and fascinating article in the New York Times by Andrew E. Kramer and Andrew Higgens on August 16, 2017 reported that a Ukranian coder known to his friends on the “dark web” as ...

Large Insurance Company Settles for $5.5 Million over "Failed To Patch" Data Breach

A large insurance company (Nationwide) agreed to pay a total of $5.5 Million to settle charges brought by 32 states resulting from the loss of critical consumer information attributable ...

This Is A First: Spear Phishing Attack Uses Compromised PowerPoint Slide Deck

Bad guys are exploiting the CVE-2017-0199 vulnerability to bypass endpoint security software and deliver the Remcos remote access Trojan via Microsoft PowerPoint decks. This particular ...

Survey of 2600 IT Pros: "Password Procedures Still Are A Cyber Security Fail"

After the NIST passwords bombshell, we surveyed 2,600 IT professionals to find out how they were managing passwords. The answers show that IT Pros are generally receptive to the proposed ...

The Cyber Security Of Our Electricity Grid

Guest Blogger Craig Reeds commented on the safety of our Electricity Grid. "Over the last couple of years, there has been a lot of discussion about the security of the electric grid. We ...

OK, Who -Is- This Stu Guy Anyway? [VIDEO]

I had a freelance video PR crew follow me one day at Black Hat, and here are two short clips that will give you an idea of who the heck I am.

APT28 Uses Spear Phishing and NSA EternalBlue Exploit To Attack Hotel Wi-Fi

Russian APT28 (aka the Fancy Bear hacking group) is harnessing EternalBlue; NSA's Windows SMB exploit which made the WannaCry ransomware and Petya so effective — and are using it to ...

Tripwire Black Hat Survey: "68% of Pros Felt Cyber Security Lacking After WannaCry & Petya Attacks"

Over two-thirds of Infosec Pros who were asked at Black Hat if they felt their organizations had made the necessary cyber security improvements since the WannaCry and Petya attacks ...

New Report: Ransomware Attack Downtime, Not Ransom Demand, is the Business Killer

I have been saying this here for the last few years, and I am encouraged to see it now confirmed by a new survey from our friends at Malwarebytes. They released their “Second Annual State ...

Cyber-Attacks Soar by a Quarter as Phishing Dominates

Cyber-attacks were up by a quarter in Q2 2017, with a surprising twist: global manufacturing is now the top target. The report from NTT Security also shows that phishing is the most ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.