Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Anatomy of a ransomware attack [Infographic]

How does ransomware actually work? Ransomware attacks cause downtime, data loss, possible intellectual property theft, and in certain industries a ransomware attack is considered a data ...
Continue Reading

CyberheistNews Vol 5 #9 Mar 3, 2015 How To Get The OK To Phish Your Own Employees

CyberheistNews Vol 5 #9 Mar 3, 2015 How To Get The OK To Phish Your Own Employees IT people responsible for network security talk to us all the time. Almost all of them agree that ...
Continue Reading

Russia tops list of nation-state cyber threats against U.S.

I have been talking about cyber war / cyber threats from Russia on this blog for about two years now, and it looks like I was on the mark.
Continue Reading

How To Get The OK To Phish Your Own Employees

IT people responsible for network security talk to us all the time. Almost all of them agree that end-users are their number one headache and managing that problem continues to be a big ...
Continue Reading

Number One Infosec Headache Is End Users

Continue Reading

CyberheistNews Vol 5 #8 | Two Disgusting Scams Of The Week: Death And Taxes

Scam Of The Week #1: Death In The Family Cybercrime is innovating on a known and disgusting scam; preying on people that have recently suffered a loss. Used to be that old time scam ...
Continue Reading

Intel Report About Social Engineering

In a new report, Hacking the Human OS, McAfee (owned by Intel) security researchers Raj Samani and Charles McFarland found that, increasingly, hackers are using social engineering ...
Continue Reading

Scam Of The Week: Death In The Family

Cybercrime is innovating on a known and disgusting scam; preying on people that have recently suffered a loss. Used to be that old time scam artists read the obituary notices in the ...
Continue Reading

Just Got A Social Engineering Call That The IRS Is Suing Me

This morning, Feb 20, 2015 at 8am at the house I received a robo-call in a female voice that said the following:
Continue Reading

More Phishing Attacks Going After Financial Data

Kaspersky recently reported that 28.8 percent of phishing attacks in 2014 tried to steal financial data from consumers. The results show how cybercrime has shifted its focus to payment ...
Continue Reading

CyberheistNews Vol 5 #4 Chinese Phish All Identities of NSA, CIA, FBI and more...

Chinese Phish All Identities of NSA, CIA, FBI and more... For a day or so I was puzzled that the Anthem hack trail led to China. This would normally be a Russian operation. Then an ...
Continue Reading

Kaspersky: NSA has pwned all hard drives firmware

Reuters just broke news that's pretty astounding. I\m copying just a few paragraphs and I recommend you read the release yourself.
Continue Reading

Billion Dollar Carbanak Cyberheist

As promised, here is more data about the Carbanak cyberheist in addition to the original post First of all, a map that shows the IP addresses of the institutions that were hit. Kaspersky ...
Continue Reading

More Than 16 Million Devices Are Infected With Mobile Malware

Pierluigi Paganini blogged about a recent study published by Alcatel-Lucent’s Motive Security Labs which reported that 16 million devices worldwide have been infected by mobile malware.
Continue Reading

World's Biggest Cyberheist Cybergang Phished $900 Million Out Of Banks

More than 100 financial institutions in 30 countries have been the victim of a cyberheist that lasted in some cases almost 2 years. This was not a smash-and-grab but a highly ...
Continue Reading

New KnowBe4 Console V4.0 Released

We are excited to announce Version 4.0 of the KnowBe4 console with some exciting new phishing features! Here are the two main highlights and the rest of the list is below. - Random ...
Continue Reading

Anthem Hack Caused By A Phished System Admin?

The foreign hackers who stole up to 80 million records from Anthem social engineered their way into the company's network by obtaining the credentials of five tech workers. Thomas Miller, ...
Continue Reading

Antivirus Products Are Slow at Making Malware Signatures

The traditional malicious software detection approach is far from being sufficient, especially in corporate environments. More and more it's found that antivirus products can take months ...
Continue Reading

Ransomware We Have Not Seen The Worst Yet

The massive success of CryptoLocker starting September 2013 has spawned a number of rapidly growing ransomware families. More recent versions of this malware have learned a number of ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews