Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

July 2016 Ransomware Roundup: New Strains And New Nasty Features

The ransomware market is rapidly maturing, we start seeing upgraded strains and rebranded versions sold cheaply in the Dark Web. And mainstream media have finally glommed on after years ...

When the Bad Guys Go to Ransomware B-School

By Eric Howes, KnowBe4 Principal Lab Researcher. As we have documented numerous times in this space over the past few years, the bad guys have proven to be relentless innovators, ...

The Latest from Black Hat 2016: Ransomware By the Numbers

The annual Black Hat security conference always produces a wealth of interesting papers, presentations, talks, live demos, and security news. This year's Black Hat USA 2016 event, which ...

Yes, that email is really from Paypal. And, yes, it's really malicious.

Score another one for the bad guys, who have yet again demonstrated their seemingly inexhaustible ability to concoct new methods to exploit legitimate services in order to bypass existing ...

First Half 2016 Top 10 Phone Scams Revealed

You may not have heard of Atlanta-based Pindrop Labs. They have developed an innovative way to detect fraudulent phone calls called a "phone print", and their solutions reduce fraud ...

New KnowBe4 Phishing Templates: A Summary 7/30/2016

Over the past few weeks our Phishing Templates Mistress Katie and her team have added 17 new templates for use by customers in their simulated phishing campaigns.

Scam Of The Week: Illegal Game of Thrones Download

Illegally downloading television shows and movies from a variety of torrent websites is done all the time. The HBO series, "Game of Thrones" is the #1 downloaded, not surprisingly. This ...

New Ransomware-as-a-Service Offering Goes Live

The cybermafia behind the Petya/Mischa ransomware just launched their RaaS offering July 25th. It pays "distributors" a part of the ransom that gets extorted from victims and increases ...

Cyber Attack Maps...Accurate Or Just Eye Candy?

Here are the top 5 Cyber Attack Maps found in Google. They all seem to show the cyber attacks in a slightly different perspective. This is the Norse attack map as an example:

Why does Kevin Mitnick recommend 20+ character passwords?

The background is based on current state-of-the-art password cracking technology. In short, hackers penetrate the network, get access to a domain controller and pull the file with all ...

Scam Of The Week: RNC Attendees Get Hacked Through Fake Wi-Fi Networks

The PR people at Avast decided to have some fun and created a series of fake Wi-Fi networks at various locations around the Republican National Congress in Cleveland. Avast’s team set up ...

Why take files hostage when you can take victim's private lives instead?

A new malware strain dubbed "Delilah" is being sprung on unsuspecting victims visiting "popular adult and gaming sites." The goal of this malware, which is currently being classified as a ...

Criminal Ransomware Now Cheaper Than Standard Antivirus

For just $39 you, too, can have your very own ransomware with a lifetime license. What does a year's subscription to one of the major antivirus cost? Last I checked, much more than $39. ...

Scam Of The Week: Pokémon Malware, Muggings And Other Mayhem

In case you just came back from vacation, there literally is a new craze going on with an augmented-reality smartphone app called Pokémon Go. It's a geocaching game, meaning it's tied to ...

Locky Ransomware Encrypts Files Even When Machine Is Offline

Locky is currently one of the top 3 ransomware threats, following closely behind CryptoWall. It's not surprising that this strain has undergone several updates since the beginning of the ...

The fine art of not being stupid - security awareness training

Brian Honan wrote a GREAT post at HelpnetSecurity. This is a cross-post of his excellent article, nothing changed, all the internal links to helpnet security were left in place. "There is ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.