Kevin David Mitnick (Aug 6, 1963 - July 16, 2023)
The only constant is change. That is true for physics, for organizations, and for us humans. People join and leave teams, and of course also join and leave life. But it's always a shock ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
The only constant is change. That is true for physics, for organizations, and for us humans. People join and leave teams, and of course also join and leave life. But it's always a shock ...
Cybercriminals are exploiting the introduction of “.ZIP” as a new generic Top-Level Domain (gTLD) to launch phishing attacks, according to researchers at Fortinet.
KnowBe4 offers the world’s largest library of always-fresh security awareness and compliance training content that includes assessments, interactive training modules, videos, games, ...
A new generative AI model called “WormGPT” is being offered on cybercrime forums, according to researchers at SlashNext. While other AI tools, such as ChatGPT, have safeguards in place ...
Do you need an easy, automated way to provide real-time feedback the moment your users make risky mistakes to help reinforce the training campaigns you manage today?
KnowBe4 ranks number one overall on the 2023 Technology Top Workplaces list for the third consecutive year and earns national recognition as an employer of choice!
New insight from blockchain analysis company, Chainalysis, shows that activity involving known ransomware crypto addresses has grown over the last 18 months, despite a downfall of other ...
The quantity of emails involved in scams and cyber attacks continues to grow as credential theft and response-based phishing persist as top attack variants.
A new scam aimed at stealing your credit card and banking information has reared its’ ugly head as a completely legitimate ad that is likely to be clicked based on the corresponding ...
PoisonGPT works completely normally, until you ask it who the first person to walk on the moon was.
Researchers at Check Point outline various forms of tailgating attacks. These attacks can allow threat actors to bypass physical security measures via social engineering.
As the rate of ransomware attacks steadily increased over time, there are clear indicators as to how these attacks are starting and, therefore, what can be done to stop them.
Using a new twist to bypass detection from security solutions, cyber attacks are now employing QR codes that your users will not recognize as anything suspicious.
Researchers at Veriti have observed hundreds of spoofed domains following Meta’s launch of its Threads social media platform.
On July 10th, the EU Commission adopted anadequacy decision for the proposed EU-U.S. Data Privacy Framework. This is exciting news for organizations, as many have been stuck in privacy ...
A phishing campaign is targeting the tourism and hospitality industries, according to researchers at Votiro.
Australia officially launched their National Anti-Scam Centre this week. With more than AUD $3.1 billion lost each year, Australians need support.
Job scams are a rising form of socially engineered cybercrime. And while it’s easy to imagine the trouble they cause individuals who innocently fall for them (lost opportunities, identity ...