Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

More About Petya Hard Disk Lock BSoD Ransomware

[UPDATE April 10, 2016] Petya's ransomware's encryption has been defeated and a password generator has been released. See bottom of the post. March 25, news came out about a new type of ...

KnowBe4 Has Blowout First Quarter 2016

KnowBe4, the United States’ most popular integrated platform for security awareness training and simulated phishing tests, announced it attained a top spot (#220) in the Cybersecurity ...

It's CONFIRMED: MedStar Receives A Massive Ransomware Demand

It is now confirmed, The MedStar Hospital Chain was hit with ransomware and has received a digital ransom note. A Baltimore Sun reporter has seen a copy of the cybercriminal's demands. ...

I am introducing a new phishing term: "Attackment"

Phishing attacks usually have a payload of infected attachments. With the recent ransomware attacks on hospitals I was asked for a press quote and the word "Attackment" suddenly came into ...

Ransomware Attack Shuts Down Medstar Washington Hospital

The Washington Post reported that a ransomware infection penetrated the computer network of MedStar Health early Monday morning, forcing the Washington health care behemoth to shut down ...

New Feature: IP Geolocation

When a user clicks on a link in a simulated phishing attack, or opens an attachment, we record the IP address of the request. For various reasons, KnowBe4 customers have requested us to ...

Scam Of The Week: Phishing Email Uses Accurate GPS Data To Catch Speeding Drivers

[UPDATE] See new information at the bottom of this posts. A phishing scam posing as a speeding ticket email with a malicious link is nothing new. But here's an innovation that should give ...

Survey: 62% of Companies Lack Confidence in Ability to Confront Ransomware Threat

Tripwire just published a new study which suggests that a majority of businesses might not be adequately prepared to either prevent or fully recover from ransomware infections. They ...

New Ransomware Written In Windows PowerShell

Lucian Constantin at CSO had the scoop. A new ransomware program written in Windows PowerShell is being used in attacks against enterprises, including health care organizations, ...

PETYA ransomware Locks Users Out by Overwriting Master Boot Record

Security researchers at Trend Micro have found a new type of ransomware that doesn’t encrypt specific files but makes the entire hard drive inaccessible. The malware has been named Petya ...

Social Engineering Tactics101: 18 ways to hack a human [INFOGRAPHIC]

CSO Online found a great infographic created by the folks of Smartfile. They started out with: "What will the cause of your next security breach? Will it be your firewall? Will it be your ...

New Maktub Ransomware Strain - Beautiful And Dangerous

Maktub Locker is the name of a new Russian strain of ransomware. The word Maktub is Arabic for "fate", suggesting it is inevitable you will get infected with ransomware. They have spent a ...

Tampa Bay Business Owner Affected By Ransomware

Ransomware continues to be a successfull business for the cybercriminals of the world. It can easily get past even the best anti-virus software through a user just clicking once on ...

InfoSec World 2016 Conference & Expo

Responsible for IT Security?

TeamViewer Denies It Is Surprise Ransomware Infection Vector

A modified version of EDA2, an open source ransomware strain developed by Turkish computer engineering student Utku Sen, --by the way, thanks Utku, that was a very smart idea-- has been ...

FBI and Microsoft Warn Against Hybrid Targeted Samas Ransomware Attack

The FBI and Microsoft have issued a new alert, a warning of hybrid targeted ransomware attacks that attempt to encrypt an organization’s entire network. This is a new approach where ...

Chinese hackers behind U.S. ransomware attacks - security firms

Reuters was the first out with a story about criminal Chinese hackers also trying to get into the ransomware racket. They started out with: "Hackers using tactics and tools previously ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.