Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

How A Fake Cybersecurity Statistic Raced Through Washington

Nextgov wrote: "It’s the kind of figure that can make your jaw drop, the kind that forces lawmakers and public officials to get off their duffs and do something, that drives home the way ...

Scam Of The Week: Tech Support Exploits WannaCry Ransomware Fears

We all know about the infamous WannaCry ransomworm which caused a worldwide 1 billion dollars in damage, targeting mainly un-patched Windows 7 machines. As expected, the bad guys are now ...

Symantec: "Email Becomes the Weapon of Choice"

Symantec's 2017 Internet Security Threat Report (ISTR) details how simple tactics and innovative cyber criminals led to unprecedented outcomes in global threat activity. This report ...

[Heads-Up] Cyber Insurance Does Not Pay Out For Human Error

The WanaCry ransomworm has caused insurance companies really to take notice. Customers have started to file damage claims, it is a bit early however to see the insurance industry's full ...

Kevin Mitnick And I Did The Cyber Investing Summit Keynote At The NYSE

The Second Annual Cyber Investing Summit met yesterday at the New York Stock Exchange, and Kevin and I did the keynote, the first time in 5 years that we made it on stage together, which ...

Exclusive: North Korea's Unit 180, the cyber warfare cell that worries the West

Ju-min Park and James Pearson from Reuters wrote a remarkable piece that you need to know about. They wrote: "North Korea's main spy agency has a special cell called Unit 180 that is ...

The New Ransom Target: Entertainment Files. Who Is The Next Phishing Victim?

Remember the James Bond movie Goldfinger? It was based on Ian Fleming's seventh novel, which first featured the timeless quote: "Once is happenstance, twice is coincidence, the third time ...

Scam Of The Week: Massive DocuSign Phishing Attacks

DocuSign has admitted they were the victim of a data breach of customer email addresses only that has led to massive phishing attacks which used the exfiltrated DocuSign information. ...

WanaCry Ransomware Was Not The First To Use NSA's ETERNALBLUE

April 14th this year, The Shadow Brokers released a stolen zoo of NSA hacking tools. One of these was ETERNALBLUE, a Windows exploit using an outdated Microsoft network communications ...

CBANC Peer Reviews of KnowBe4

CBANC is the largest online network of verified banking and credit union professionals. They provide answers for every bank and credit union, and allow you to tap into the collective ...

Shadow Brokers Offer New SaaS 0-Day Threat Subscription Model

The mysterious Shadow Brokers – the hackers who leaked the NSA SMB zero-day exploit that powered WanaCry into the world's worst ransomworm – are back, and could cause even more damage. In ...

Are The North Koreans Behind WanaCry Ransomware?

A North Korean hacking group is suspected to be behind WanaCry. Symantec and Kaspersky malware labs are investigating technical evidence that possibly suggests the North’s involvement, ...

Telefonica Victim Of $600,000 Bitcoin Ransomware Attack

Spanish telecoms giant Telefonica was confronted with 85 percent of their systems shut down after ransomware criminals infiltrated its systems demanding $550,000 in Bitcoin. Telefonica is ...

Raising Cyber Security Awareness Training Doesn’t Have to be Boring

You may not be aware that the Wall Street Journal recently created a separate WSJ Pro Cybersecurity newsletter in the form of a regular email with relevant news. Of course I subscribed to ...

Macron Campaign Fought Off Phishing Attacks With Cyberdeception Techniques

Gadi Evron is the Founder and CEO at IT security company Cymmetrica. He wrote a long-ish post on hackernoon (which is powered by Medium). I'm giving you the upshot, but first, what is ...

NEW: Download The "Weak Password Test" Utility

How weak are your user’s passwords? Are they... P@ssw0rd? Verizon's recent Data Breach Report showed that 81% of hacking-related breaches used either stolen and/or weak passwords. ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.