Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Sony Pictures Cyber Attack TIMELINE

This Sony Pictures Cyber Attack TIMELINE by the www.databreachtoday.com site is quite interesting.
Continue Reading

Announcing InfoSec World 2015

MIS Training Institute (MISTI) and their esteemed Advisory Board are excited to present the InfoSec World 2015 Conference & Expo. KnowBe4's CyberheistNews is a Media Sponsor for the ...
Continue Reading

Phishing Attack on German Steel Factory System Caused Massive Damage

Hackers breached security of a German steel mill's network and caused considerable damage by manipulating the controls of a blast furnace. The attackers gained access to the network ...
Continue Reading

CyberheistNews Vol 4 #49 Dec 23, 2014

Lessons Learned From The Sony Pictures Hack Bruce Schneier reminded me of an old but very relevant concept in IT Security. There are two types of attacks: opportunistic and targeted. And ...
Continue Reading

Scam of The Week: LinkedIn Greeting Cards Carrying Malware

System admins hold the keys to the kingdom. The NSA is actively hunting for system admin credentials. A popular way to get you to click on something that installs zero-day malware on your ...
Continue Reading

Malware Used To Wipe Sony's Drives Was Quick And Dirty

It's still not clear (and it may never be discovered) how the Democratic People's Republic of (North) Korea (DPRK) hackers came in, perhaps they used all available threat vectors since ...
Continue Reading

Staples: 6-Month Malware Breach, 1.16 Million Cards

Office supply chain Staples Inc. today finally acknowledged that a malware intrusion by hackers this year at some of its stores resulted in a credit card breach. The company now says some ...
Continue Reading

Lessons Learned From The Sony Pictures Hack

Bruce Schneier reminded me of an old but very relevant concept in IT Security. There are two types of attacks: opportunistic and targeted. And then you can characterize attackers on two ...
Continue Reading

Malicious links: Spammers change malware delivery tactics

Symantec just put this out and I thought you might be interested. They are seeing a lot of hackers using Upatre and Ponik malware over the last couple of months, delivered by spam email ...
Continue Reading

I simply could not resist this vanity plate

Continue Reading

Hackers Spear-phish ICANN And Compromise DNS Zone System

It does not get any worse than this. Or better than this, if you are a criminal hacker. Domain-name management organization ICANN announced it has been hacked and its DNS zone ...
Continue Reading

[InfoGraphic] The Most Used InfoSec Words In 2014

We took almost 25,000 Hackbusters #infosec articles from 100+ feeds in 2014 and tabulated the hot topics. This "word-cloud" infographic is the result! What's Really The #1 Hot InfoSec ...
Continue Reading

New Ransomware called KEYHolder from CryptorBit Cybergang

Bleeping Computer had the scoop again: " A new ransomware has been released called KEYHolder that is from the same developers of CryptorBit . Like CryptorBit, this infection encrypts your ...
Continue Reading

CyberheistNews Vol 4 #48 Spike In Hoax News Spreading Malware

CyberheistNews Vol 4 #48 Dec 16, 2014
Continue Reading

Breaking News 2 New Ransomware Strains

#1 OphionLocker The first one is a new strain of ransomware named OphionLocker. It encrypts your data using strong open source Crypto++ Elliptical Curve Cryptography and then ransoms the ...
Continue Reading

Experts: The Human Factor Key Challenge To Information Security

The lack of awareness and understanding of risks is one of the biggest challenges to information security, according to a panel of experts. Research showed that 93% of data breaches ...
Continue Reading

Ransomware Beats APT In Terms Of Severe Impact

MalwareBytes Research showed that in the year 2014, 82% of companies were attacked online. Their research also showed that browser vulnerabilities will be the biggest challenge going ...
Continue Reading

Phishing Quiz: Can You Spot A Scam? Don't Be So Sure

Phishing Quiz: Can You Spot A Scam? Don't Be So Sure CBSNews wrote: "Phishing emails have gotten so convincing that even the experts can be taken in by a well-crafted fake. That's what ...
Continue Reading

Scam Of The Week: Spike In Hoax News Spreading Malware

The year 2014 has seen a boom on hoax news stories, as these are particularly successful social engineering tactics used by hackers to get people to click on links, and worse, share the ...
Continue Reading

Ransomware on National Public Radio: To Pay Or Not To Pay?

Aarti Shahani, the tech reporter of National Public Radio created a compelling story about the scourge of ransomware that is taking over America. The title of the story is:
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews