KnowBe4 Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in human and agent security including social and prompt engineering, ransomware and phishing attacks.

New Feature: 2-Factor Authentication

All user accounts may now be enabled to require MFA (multi-factor authentication) [also called 2FA, 2 Factor Authentication]. Once configured and enabled for an account the system will ...

KnowBe4 Debuts at #139 on Inc 500 List of America’s Fastest Growing Private Companies

I have some exciting news: KnowBe4 made it in the Inc 500! To start off with, a very big thank you to all our customers who understood the need to manage the ongoing problem of social ...

I was interviewed by DARKReading at BlackHat [VIDEO]

While at BlackHat, the editorial team from DARKReading wanted to know more about what we were doing at KnowBe4. This was a fun, relaxed 15 minutes where we chatted about problems like ...

The Ultimate Pop-up Phishing Warning Message

'Just weeks after she started preparing opposition research files on Donald Trump’s campaign chairman Paul Manafort last spring, Democratic National Committee consultant Alexandra Chalupa ...

PokemonGo Ransomware installs Backdoor Account and Spreads to other Drives

With the popularity of PokemonGo, it was inevitable that a malware developer would create a ransomware that impersonates it. This is the case with a new Hidden-Tear ransomware discovered ...

Hitler ransomware just deletes files instead of encrypting them

Security experts detected and analyzed a new threat, the Hitler ransomware, that doesn’t encrypt files but simply deletes them. Larry Abrams at Bleepingcomputer commented: " It looks like ...

Scam Of The Week: New Social Security Account Fraud

Bad guys are abusing the Social Security Administration's (SSA) online service called My SocialSecurity Account in two ways: A phishing scam which encourages employees to create an ...

July 2016 Ransomware Roundup: New Strains And New Nasty Features

The ransomware market is rapidly maturing, we start seeing upgraded strains and rebranded versions sold cheaply in the Dark Web. And mainstream media have finally glommed on after years ...

When the Bad Guys Go to Ransomware B-School

By Eric Howes, KnowBe4 Principal Lab Researcher. As we have documented numerous times in this space over the past few years, the bad guys have proven to be relentless innovators, ...

The Latest from Black Hat 2016: Ransomware By the Numbers

The annual Black Hat security conference always produces a wealth of interesting papers, presentations, talks, live demos, and security news. This year's Black Hat USA 2016 event, which ...

Yes, that email is really from Paypal. And, yes, it's really malicious.

Score another one for the bad guys, who have yet again demonstrated their seemingly inexhaustible ability to concoct new methods to exploit legitimate services in order to bypass existing ...

New KnowBe4 Phishing Templates: A Summary 7/30/2016

Over the past few weeks our Phishing Templates Mistress Katie and her team have added 17 new templates for use by customers in their simulated phishing campaigns.

Scam Of The Week: Illegal Game of Thrones Download

Illegally downloading television shows and movies from a variety of torrent websites is done all the time. The HBO series, "Game of Thrones" is the #1 downloaded, not surprisingly. This ...

New Ransomware-as-a-Service Offering Goes Live

The cybermafia behind the Petya/Mischa ransomware just launched their RaaS offering July 25th. It pays "distributors" a part of the ransom that gets extorted from victims and increases ...

Cyber Attack Maps...Accurate Or Just Eye Candy?

Here are the top 5 Cyber Attack Maps found in Google. They all seem to show the cyber attacks in a slightly different perspective. This is the Norse attack map as an example:

Why does Kevin Mitnick recommend 20+ character passwords?

The background is based on current state-of-the-art password cracking technology. In short, hackers penetrate the network, get access to a domain controller and pull the file with all ...

Scam Of The Week: RNC Attendees Get Hacked Through Fake Wi-Fi Networks

The PR people at Avast decided to have some fun and created a series of fake Wi-Fi networks at various locations around the Republican National Congress in Cleveland. Avast’s team set up ...

Why take files hostage when you can take victim's private lives instead?

A new malware strain dubbed "Delilah" is being sprung on unsuspecting victims visiting "popular adult and gaming sites." The goal of this malware, which is currently being classified as a ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.