Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

CyberheistNews Vol 3, 15

CyberheistNews Vol 3, # 15
Continue Reading

Phishing Confusion Example

So, yesterday I received this email from my Identity Theft Provider. Been with them since 2008 so I know how their emails look. Normally I get the "all clear" signal once a month, but ...
Continue Reading

Knowbe4 - CyberheistNews Vol 3, #14

Continue Reading

Automated Twitter DM Spear Phishing

Automated Twitter DM Spear Phishing. It was to be expected. Cyber criminals now are able to scrape your followers from Twitter, and send you a Direct Message (DM) supposedly coming from ...
Continue Reading

Security Awareness Training Controversy

Continue Reading

The Problem With Our Security Models

Continue Reading

CyberheistNews Vol 3, #12

Continue Reading

Georgia Tech Researchers Try To Stop Spear-phishing

Georgia Tech correctly identified that the most challenging threat facing corporate networks today is “spear phishing.” “Spear phishing is the most popular way to get into a corporate ...
Continue Reading

CyberheistNews Vol 3, #11

Continue Reading

How Phishing Attacks Are Evolving

Continue Reading

28 Percent of Data Breaches Lead to Fraud

Continue Reading

Cyberwar? Time To Calm Down A Bit

The media has a field day with this whole China / Mandiant report, but there are a few issues being confused here. It's all good and well to make the public aware of the fact that foreign ...
Continue Reading

CyberheistNews Vol 3, 09

Continue Reading

Osterman Blogs About KnowBe4

Highly regarded IT Analyst Mike Osterman wrote: "Most will agree that despite the enormous amounts spent on secure Web gateways, anti-virus software, cloud-based malware filtering and the ...
Continue Reading

Scam Of The Week - Target: IT

This week, it's -you- specifically being targeted with a phishing attack. The bad guys know very well that the most powerful weapons are administrator's credentials, as those really are ...
Continue Reading

PDF 0-day Vulnerability Being Exploited In The Wild

Last week, Adobe warned customers that a few new exploits that target Acrobat Reader were being exploited in the wild. Keep an eye out for patches that are expected soon. The exploits are ...
Continue Reading

Security firms slow to react to spear phishing like that used in China hack

Antone Gonsales at the CSO site hits the nail on the head: "Email security vendors have failed to do enough to protect customers against advanced cyberattacks like the one recently linked ...
Continue Reading

Which Antivirus Has The Best Phishing Protection? Surprise!

I ran across some very interesting research recently done by NSS Labs. They compared twelve of the most popular antivirus engines, they call them endpoint protection products (EPP) and ...
Continue Reading

New CyberSec Executive Order IT Impact Zero

Last Tuesday, the White House issued the long awaited CyberSec Executive Order, which makes an attempt to outline policies that will protect US organizations against cyber-attacks and ...
Continue Reading

Cyber Bullying

KnowBe4 is a market leader in security awareness training for employees in an office environment. However, when we asked people who finished the training what they thought, they said they ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews