Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

The Pope, Puff Jackets and Money going POOF!

You have probably seen it. Pope Francis in a designer puff jacket. It fooled millions of people. Culture writer Ryan Broderick called it the “first real mass-level AI misinformation case.”
Continue Reading

Australian Police Arrest Business Email Compromise (BEC) Operators

The Australian Federal Police (AFP) have arrested four alleged members of an organized crime group known for carrying out business email compromise (BEC) attacks, BleepingComputer ...
Continue Reading

The FBI's Public Service Warning of Business Email Compromise

The US FBI is warning of business email compromise (BEC) attacks designed to steal physical goods. While BEC attacks are typically associated with stealing money, criminals can use the ...
Continue Reading

[Eyes Only] New Deepfake Pr0n Site Visits Skyrocket

This is a disgusting topic. It's also a very high social engineering risk. I will keep this post safe-for-work, which is not easy. NBC news just reported on the deepfake economy surging ...
Continue Reading

CyberheistNews Vol 13 #13 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks

CyberheistNews Vol 13 #13 | March 28th, 2023 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks Users need to adapt to an evolving threat landscape in which attackers can use ...
Continue Reading

Confessions of a Former 'The Inside Man' Skeptic

I remember sitting in Stu Sjouwerman’s office with Perry Carpenter and myself being pitched a drama series about cyber security by Jim Shields (Creative Director - Twist & Shout) and ...
Continue Reading

KnowBe4 Debuts Season 5 of Netflix-Style Security Awareness Series - ‘The Inside Man’

We’re thrilled to announce the long-awaited fifth season of the award-winning KnowBe4 Original Series - “The Inside Man” is now available in the KnowBe4ModStore!
Continue Reading

Oversharing Is a Risk to Information Security

Younger employees need to be wary of oversharing company information on social media, according to John Karabin, senior director of cybersecurity at NTT Ltd. In an article for ...
Continue Reading

Stay Ahead of the Game: Protect Yourself From Trojanized Chat Apps Targeting WhatsApp and Telegram Users

It seems that once again bad actors have found a new way to infect our devices with malware. This time, they are using a devious little trick to spread trojanized versions of popular chat ...
Continue Reading

New Vendor Email Compromise Attack Seeks $36 Million

The details in this thwarted VEC attack demonstrate how the use of just a few key details can both establish credibility and indicate the entire thing is a scam.
Continue Reading

Ransomware Data Theft Extortion Goes up 40% to 70% From ‘21 to ’22

A report from Palo Alto Networks’ Unit 42 found that data theft extortion occurred in 70% of ransomware attacks in 2022, compared to 40% in 2021. The researchers examined the four most ...
Continue Reading

The Dangers of Vishing Campaigns and How To Protect Yourself

In recent years, cybercrime has evolved to become more sophisticated than ever before. One of the up and coming methods used by criminals is vishing (voice phishing). This is where an ...
Continue Reading

[Security Masterminds] Unlock Maximum Cybersecurity: 3 Crucial Steps to Enhance Your Capabilities, Coverage, and Culture

Do you ever feel like you are always playing catch up regarding cybersecurity? That it is a never-ending game; no matter what you do, you are always one step behind. You are not alone. ...
Continue Reading

Users Clicking on Multiple Mobile Phishing Links Increases 637% in Just Two Years

New data shows that phishing mobile devices as an attack vector is growing in popularity – mostly because it’s increasingly working... in exponential terms.
Continue Reading

Cyber Insurers Quietly Remove Coverage for Social Engineering and Fraudulent Instruction Claims

As cyber insurers become more experienced in what kinds of claims are being presented, and the threat action details therein, specific types of coverages are no longer being included.
Continue Reading

Half of Organizations Report at Least Monthly Outages from Cyberattacks

New data on the current state of cybersecurity shows that organizations are experiencing challenges, falling behind, and seeing the impact of all this post-attack.
Continue Reading

Facebook and Microsoft Top the List of Most Impersonated Brands in 2022

As scammers continue to see massive returns on their phishing attacks, the use of impersonation with well-known brands continues to circle around the dominant players.
Continue Reading

When a USB Flash Drive is Actually a Bomb

A journalist based in Ecuador recently used a USB flash drive that was actually a legitimate bomb.
Continue Reading

Identifying AI-Enabled Phishing

Users need to adapt to an evolving threat landscape in which attackers can use AI tools like ChatGPT to craft extremely convincing phishing emails, according to Matthew Tyson at CSO.
Continue Reading

The Future of Cyber Attacks? Speed, More Speed

I get asked all the time to “predict” the future of cybercrime. What will be the next big cyber attack? What will be the next paradigm platform shift that attackers will target? And so on.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews