New Feature: 2-Factor Authentication
All user accounts may now be enabled to require MFA (multi-factor authentication) [also called 2FA, 2 Factor Authentication]. Once configured and enabled for an account the system will ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in human and agent security including social and prompt engineering, ransomware and phishing attacks.
All user accounts may now be enabled to require MFA (multi-factor authentication) [also called 2FA, 2 Factor Authentication]. Once configured and enabled for an account the system will ...
I have some exciting news: KnowBe4 made it in the Inc 500! To start off with, a very big thank you to all our customers who understood the need to manage the ongoing problem of social ...
While at BlackHat, the editorial team from DARKReading wanted to know more about what we were doing at KnowBe4. This was a fun, relaxed 15 minutes where we chatted about problems like ...
'Just weeks after she started preparing opposition research files on Donald Trump’s campaign chairman Paul Manafort last spring, Democratic National Committee consultant Alexandra Chalupa ...
With the popularity of PokemonGo, it was inevitable that a malware developer would create a ransomware that impersonates it. This is the case with a new Hidden-Tear ransomware discovered ...
Security experts detected and analyzed a new threat, the Hitler ransomware, that doesn’t encrypt files but simply deletes them. Larry Abrams at Bleepingcomputer commented: " It looks like ...
Bad guys are abusing the Social Security Administration's (SSA) online service called My SocialSecurity Account in two ways: A phishing scam which encourages employees to create an ...
The ransomware market is rapidly maturing, we start seeing upgraded strains and rebranded versions sold cheaply in the Dark Web. And mainstream media have finally glommed on after years ...
By Eric Howes, KnowBe4 Principal Lab Researcher. As we have documented numerous times in this space over the past few years, the bad guys have proven to be relentless innovators, ...
The annual Black Hat security conference always produces a wealth of interesting papers, presentations, talks, live demos, and security news. This year's Black Hat USA 2016 event, which ...
Score another one for the bad guys, who have yet again demonstrated their seemingly inexhaustible ability to concoct new methods to exploit legitimate services in order to bypass existing ...
Over the past few weeks our Phishing Templates Mistress Katie and her team have added 17 new templates for use by customers in their simulated phishing campaigns.
Illegally downloading television shows and movies from a variety of torrent websites is done all the time. The HBO series, "Game of Thrones" is the #1 downloaded, not surprisingly. This ...
The cybermafia behind the Petya/Mischa ransomware just launched their RaaS offering July 25th. It pays "distributors" a part of the ransom that gets extorted from victims and increases ...
Here are the top 5 Cyber Attack Maps found in Google. They all seem to show the cyber attacks in a slightly different perspective. This is the Norse attack map as an example:
The background is based on current state-of-the-art password cracking technology. In short, hackers penetrate the network, get access to a domain controller and pull the file with all ...
The PR people at Avast decided to have some fun and created a series of fake Wi-Fi networks at various locations around the Republican National Congress in Cleveland. Avast’s team set up ...
A new malware strain dubbed "Delilah" is being sprung on unsuspecting victims visiting "popular adult and gaming sites." The goal of this malware, which is currently being classified as a ...