Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Ju-min Park and James Pearson from Reuters wrote a remarkable piece that you need to know about. They wrote: "North Korea's main spy agency has a special cell called Unit 180 that is ...
Remember the James Bond movie Goldfinger? It was based on Ian Fleming's seventh novel, which first featured the timeless quote: "Once is happenstance, twice is coincidence, the third time ...
DocuSign has admitted they were the victim of a data breach of customer email addresses only that has led to massive phishing attacks which used the exfiltrated DocuSign information. ...
April 14th this year, The Shadow Brokers released a stolen zoo of NSA hacking tools. One of these was ETERNALBLUE, a Windows exploit using an outdated Microsoft network communications ...
CBANC is the largest online network of verified banking and credit union professionals. They provide answers for every bank and credit union, and allow you to tap into the collective ...
The mysterious Shadow Brokers – the hackers who leaked the NSA SMB zero-day exploit that powered WanaCry into the world's worst ransomworm – are back, and could cause even more damage. In ...
A North Korean hacking group is suspected to be behind WanaCry. Symantec and Kaspersky malware labs are investigating technical evidence that possibly suggests the North’s involvement, ...
Spanish telecoms giant Telefonica was confronted with 85 percent of their systems shut down after ransomware criminals infiltrated its systems demanding $550,000 in Bitcoin. Telefonica is ...
You may not be aware that the Wall Street Journal recently created a separate WSJ Pro Cybersecurity newsletter in the form of a regular email with relevant news. Of course I subscribed to ...
Gadi Evron is the Founder and CEO at IT security company Cymmetrica. He wrote a long-ish post on hackernoon (which is powered by Medium). I'm giving you the upshot, but first, what is ...
How weak are your user’s passwords? Are they... P@ssw0rd? Verizon's recent Data Breach Report showed that 81% of hacking-related breaches used either stolen and/or weak passwords. ...
CyberheistNews | KnowBe4
For the third time now, the experts at AV-TEST examined a large number of the security software applications on the market in terms of how well they protect themselves. The focus was on ...
Business Insider just wrote: "Warren Buffett sees cyber attacks as a bigger threat to humanity than nuclear weapons. "I'm very pessimistic on weapons of mass destruction generally ...
KnowBe4 gets thousands of phishing attacks reported weekly through our free Phish Alert Button, and we pick the 10 most tricky ones, defang them, and put these into a phishing campaign ...
There is no better budget ammo for new-school security awareness training than this. Attempts at cyber wire fraud, using spoofed email to impersonate a C-level executive or trusted ...
Russian organized cybercrime now has a surprising method of determining how much to ask for – the Big Mac index from The Economist. Security firm Recorded Future blogged that in March, a ...