KnowBe4

Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.

Colleges Become Phishing Targets with Student Loans as the Payoff

Anytime there’s a transaction involving money, cybercriminals look for ways to hack in and intercept funds. Student Loans are the latest target.
Continue Reading

Your Users May Be Too Embarrassed to Report Email Scams

New research shows 25% of users falling victim to impersonation fraud were so ashamed they chose not to report it. Even worse, many don’t know how to spot the scam.
Continue Reading

[ALERT] CEO Fraud Escalates. Bad Guys Now Go After Employee Personal Address And Phone Number

KnowBe4 is observing a serious escalation of CEO Fraud. They are now requesting street addresses and personal phone numbers of employees—an attempt to contact and manipulate employees ...
Continue Reading

Cyber Attacks Cost German Industry Almost $50 Billion: Study

BERLIN (Reuters) – Two thirds of Germany’s manufacturers have been hit by cyber-crime attacks, costing industry in Europe’s largest economy some 43 billion euros ($50 billion), according ...
Continue Reading

Phishing from Beyond the Grave...

By Eric Howes,  KnowBe4 Principal Lab Researcher. It's no secret that the threat of phishing emails has been growing at an alarming rate for a number of years. Indeed, ZDNet recently ...
Continue Reading

KnowBe4 Wins Channelnomics Security Award for Best Security Training

World’s largest library of security awareness training recognized for excellence
Continue Reading

[VIDEO] Password Sharing Means Not Caring

How Fast Can Your Domain Admin Password Be Cracked? 19% of employees of small and medium-sized businesses (SMBs) share their passwords with coworkers, according to a study by Switchfast. ...
Continue Reading

Want to Know How to Break into a Henhouse? Hire a Fox

Red teaming starts with research. So does social engineering. Red teaming is the practice of thinking and acting like an attacker to test an organization’s defenses, according to security ...
Continue Reading

Details of North Korea Attacks Highlight Email’s Role in Attacks

When you think of cyber-espionage, you might be surprised it’s far less “Mission: Impossible” and a lot more basic phishing tactics.
Continue Reading

Phishing Scammers are Planning Well into 2020

Cybercriminals are already looking to take advantage of the 2020 Tokyo Olympics. Are you thinking years out? The bad guys are.
Continue Reading

New York State Universities Targeted by Phishing Scams

Students from Plattsburgh State and SUNY Adirondack were targeted by several types of scams over the summer, causing Plattsburgh State officials to send out warnings to the student body. ...
Continue Reading

Phishing warning: One in every one hundred emails is now a hacking attempt

And just one mistake can compromise an entire organisation. Danny Palmer at ZDNet wrote: "One in every one hundred emails sent round the globe has malicious intent, likely to deliver ...
Continue Reading

SCAM OF THE WEEK: "The Boss Needs iTunes Gift Cards For Customers... NOW"

If you ever wondered if those iTunes gift card phishes really work, see the below email exchange.
Continue Reading

What is the secret to keeping your network safe? Training and automation

Just in time before October's Cybersecurity Awareness Month, DomainTools released its second annual Cybersecurity Report Card in which infosec pros were surveyed about their security ...
Continue Reading

Try this Weak Password Test for a chance to win a Nintendo Switch!

Are your user’s passwords…P@ssw0rd? Verizon's Data Breach Report showed that 81% of hacking-related breaches used either stolen and/or weak passwords. Employees are the weakest link in ...
Continue Reading

"Voice Phishing" in Korea This Year Already Exceeds 2017 Numbers.

The Korea JoonGang Daily reported that despite warnings from financial authorities, an average of 116 people fall victim to what is called "voice phishing" scams every day in Korea.
Continue Reading

DMARC and Its Place in Email Security

Dealing with business email compromise (BEC) requires people, process, and technology. As we've noted before, the problem is growing. Harder to detect and evolving in sophistication, ...
Continue Reading

Weaponized IQY Files Make Excel Users an Easy Target

The Necurs botnet – most notably responsible for distributing Locky – is now pushing weaponized internet or web query (.IQY) file to evade detection and download malware.
Continue Reading

Only 40% of Business Phishing Scams Contain Links

This latest statistic takes the spotlight off of antivirus as the protector, and puts the focus squarely in the hands of your users to stop attacks.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews