<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Human Risk Management Blog</title>
    <link>https://blog.knowbe4.com</link>
    <description>KnowBe4's blog keeps you informed about the latest in security including social engineering, ransomware and phishing attacks.</description>
    <language>en-us</language>
    <pubDate>Fri, 17 Apr 2026 13:00:01 GMT</pubDate>
    <dc:date>2026-04-17T13:00:01Z</dc:date>
    <dc:language>en-us</dc:language>
    <item>
      <title>Identity at the Edge: How the Sixth Annual Identity Management Day Highlights the New Frontiers of Trust</title>
      <link>https://blog.knowbe4.com/identity-at-the-edge-how-the-sixth-annual-identity-management-day-highlights-the-new-frontiers-of-trust</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/identity-at-the-edge-how-the-sixth-annual-identity-management-day-highlights-the-new-frontiers-of-trust" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CISO_Blog_KawinB_400x225.png" alt="Identity at the Edge: How the Sixth Annual Identity Management Day Highlights the New Frontiers of Trust" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Each year, Identity Management Day (IMD) serves as a global reminder that managing digital identities is more than a technical requirement; it is a cornerstone of modern trust. Now in its sixth year, IMD continues to emphasize how identity itself is evolving, stretching beyond human users to encompass machines, automated agents, and even AI-generated personas.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/identity-at-the-edge-how-the-sixth-annual-identity-management-day-highlights-the-new-frontiers-of-trust" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CISO_Blog_KawinB_400x225.png" alt="Identity at the Edge: How the Sixth Annual Identity Management Day Highlights the New Frontiers of Trust" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Each year, Identity Management Day (IMD) serves as a global reminder that managing digital identities is more than a technical requirement; it is a cornerstone of modern trust. Now in its sixth year, IMD continues to emphasize how identity itself is evolving, stretching beyond human users to encompass machines, automated agents, and even AI-generated personas.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fidentity-at-the-edge-how-the-sixth-annual-identity-management-day-highlights-the-new-frontiers-of-trust&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AI</category>
      <category>HRM+</category>
      <category>AIDA</category>
      <category>identity management</category>
      <pubDate>Fri, 17 Apr 2026 13:00:01 GMT</pubDate>
      <guid>https://blog.knowbe4.com/identity-at-the-edge-how-the-sixth-annual-identity-management-day-highlights-the-new-frontiers-of-trust</guid>
      <dc:date>2026-04-17T13:00:01Z</dc:date>
      <dc:creator>Dr. Kawin Boonyapredee</dc:creator>
    </item>
    <item>
      <title>CyberheistNews Vol 16 #15 Anthropic's Mythos Is Not Just a Tool. It's Something You Have to Contain.</title>
      <link>https://blog.knowbe4.com/cyberheistnews-vol-16-15-anthropics-mythos-is-not-just-a-tool-its-something-you-have-to-contain</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/cyberheistnews-vol-16-15-anthropics-mythos-is-not-just-a-tool-its-something-you-have-to-contain" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CHNNewsletter_Thumbnail.png" alt="CyberheistNews Vol 16 #15" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/cyberheistnews-vol-16-15-anthropics-mythos-is-not-just-a-tool-its-something-you-have-to-contain" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CHNNewsletter_Thumbnail.png" alt="CyberheistNews Vol 16 #15" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fcyberheistnews-vol-16-15-anthropics-mythos-is-not-just-a-tool-its-something-you-have-to-contain&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybercrime</category>
      <category>KnowBe4</category>
      <pubDate>Tue, 14 Apr 2026 13:30:00 GMT</pubDate>
      <guid>https://blog.knowbe4.com/cyberheistnews-vol-16-15-anthropics-mythos-is-not-just-a-tool-its-something-you-have-to-contain</guid>
      <dc:date>2026-04-14T13:30:00Z</dc:date>
      <dc:creator>KnowBe4 Team</dc:creator>
    </item>
    <item>
      <title>New KnowBe4 Agent Risk Manager Addresses Pervasive AI Agent Risk</title>
      <link>https://blog.knowbe4.com/agent-risk-manager-ai-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/agent-risk-manager-ai-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/og_image_default.png" alt="New KnowBe4 Agent Risk Manager Addresses Pervasive AI Agent Risk" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;em&gt;By Roger A. Grimes and Matthew Duren&lt;/em&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/agent-risk-manager-ai-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/og_image_default.png" alt="New KnowBe4 Agent Risk Manager Addresses Pervasive AI Agent Risk" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;em&gt;By Roger A. Grimes and Matthew Duren&lt;/em&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fagent-risk-manager-ai-security&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>KnowBe4</category>
      <category>AI</category>
      <category>Agent Risk Management</category>
      <pubDate>Tue, 14 Apr 2026 12:00:00 GMT</pubDate>
      <guid>https://blog.knowbe4.com/agent-risk-manager-ai-security</guid>
      <dc:date>2026-04-14T12:00:00Z</dc:date>
      <dc:creator>KnowBe4 Team</dc:creator>
    </item>
    <item>
      <title>Anthropic's Mythos Preview: Why the Human Layer Matters More, Not Less</title>
      <link>https://blog.knowbe4.com/anthropics-mythos-preview-why-the-human-layer-matters-more-not-less</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/anthropics-mythos-preview-why-the-human-layer-matters-more-not-less" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Preview_Img_1.png" alt="Anthropic's Mythos Preview: Why the Human Layer Matters More, Not Less" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The human layer is not impacted by Anthropic's Mythos Preview announcement. If anything, it is reinforced, and for reasons that deserve to be spelled out clearly.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/anthropics-mythos-preview-why-the-human-layer-matters-more-not-less" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/Preview_Img_1.png" alt="Anthropic's Mythos Preview: Why the Human Layer Matters More, Not Less" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The human layer is not impacted by Anthropic's Mythos Preview announcement. If anything, it is reinforced, and for reasons that deserve to be spelled out clearly.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fanthropics-mythos-preview-why-the-human-layer-matters-more-not-less&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Human Risk Management</category>
      <category>AI</category>
      <pubDate>Mon, 13 Apr 2026 21:47:10 GMT</pubDate>
      <guid>https://blog.knowbe4.com/anthropics-mythos-preview-why-the-human-layer-matters-more-not-less</guid>
      <dc:date>2026-04-13T21:47:10Z</dc:date>
      <dc:creator>Martin Kraemer</dc:creator>
    </item>
    <item>
      <title>New Phishing Kit Streamlines ClickFix Attacks</title>
      <link>https://blog.knowbe4.com/new-phishing-kit-streamlines-clickfix-attacks</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/new-phishing-kit-streamlines-clickfix-attacks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/abstract_data_theft_stream_1200x630.jpg" alt="New Phishing Kit Streamlines ClickFix Attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A new commodity phishing kit called “Venom Stealer” allows threat actors to automate ClickFix attacks, according to researchers at BlackFog. ClickFix is a social engineering technique that tricks users into executing malicious commands on their computer, usually resulting in malware installation.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/new-phishing-kit-streamlines-clickfix-attacks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/abstract_data_theft_stream_1200x630.jpg" alt="New Phishing Kit Streamlines ClickFix Attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A new commodity phishing kit called “Venom Stealer” allows threat actors to automate ClickFix attacks, according to researchers at BlackFog. ClickFix is a social engineering technique that tricks users into executing malicious commands on their computer, usually resulting in malware installation.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fnew-phishing-kit-streamlines-clickfix-attacks&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Social Engineering</category>
      <category>Phishing</category>
      <category>Malware</category>
      <category>Cybercrime</category>
      <pubDate>Mon, 13 Apr 2026 13:00:03 GMT</pubDate>
      <guid>https://blog.knowbe4.com/new-phishing-kit-streamlines-clickfix-attacks</guid>
      <dc:date>2026-04-13T13:00:03Z</dc:date>
      <dc:creator>KnowBe4 Team</dc:creator>
    </item>
    <item>
      <title>Phishing Campaign Targets Japanese Firms During Tax Season</title>
      <link>https://blog.knowbe4.com/japanese-firms-silver-fox-tax-phishing-campaign</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/japanese-firms-silver-fox-tax-phishing-campaign" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/japan_outdoors_office_workers_1200x630.jpg" alt="Phishing Campaign Targets Japanese Firms During Tax Season" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A criminal threat actor called “Silver Fox” is launching tax-themed phishing attacks against Japanese companies during the country’s tax season, according to researchers at ESET.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/japanese-firms-silver-fox-tax-phishing-campaign" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/japan_outdoors_office_workers_1200x630.jpg" alt="Phishing Campaign Targets Japanese Firms During Tax Season" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A criminal threat actor called “Silver Fox” is launching tax-themed phishing attacks against Japanese companies during the country’s tax season, according to researchers at ESET.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fjapanese-firms-silver-fox-tax-phishing-campaign&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Phishing</category>
      <category>Cybercrime</category>
      <pubDate>Fri, 10 Apr 2026 17:45:00 GMT</pubDate>
      <guid>https://blog.knowbe4.com/japanese-firms-silver-fox-tax-phishing-campaign</guid>
      <dc:date>2026-04-10T17:45:00Z</dc:date>
      <dc:creator>KnowBe4 Team</dc:creator>
    </item>
    <item>
      <title>Rising Compliance Oversight Pressure: From Audit Fatigue to Continuous Readiness</title>
      <link>https://blog.knowbe4.com/rising-compliance-oversight-pressure-from-audit-fatigue-to-continuous-readiness</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/rising-compliance-oversight-pressure-from-audit-fatigue-to-continuous-readiness" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CR-0492_thumbnail_five-essentials-compliance-training-design-wp.png" alt="Rising Compliance Oversight Pressure: From Audit Fatigue to Continuous Readiness" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Public sector cybersecurity leaders are no longer measured solely on whether they stop attacks, they are measured on whether they can prove it. Across federal, state, local and education environments, compliance obligations continue to expand. Frameworks and mandates include:&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/rising-compliance-oversight-pressure-from-audit-fatigue-to-continuous-readiness" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CR-0492_thumbnail_five-essentials-compliance-training-design-wp.png" alt="Rising Compliance Oversight Pressure: From Audit Fatigue to Continuous Readiness" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Public sector cybersecurity leaders are no longer measured solely on whether they stop attacks, they are measured on whether they can prove it. Across federal, state, local and education environments, compliance obligations continue to expand. Frameworks and mandates include:&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Frising-compliance-oversight-pressure-from-audit-fatigue-to-continuous-readiness&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Compliance</category>
      <category>Human Risk Management</category>
      <pubDate>Fri, 10 Apr 2026 13:00:02 GMT</pubDate>
      <guid>https://blog.knowbe4.com/rising-compliance-oversight-pressure-from-audit-fatigue-to-continuous-readiness</guid>
      <dc:date>2026-04-10T13:00:02Z</dc:date>
      <dc:creator>KnowBe4 Team</dc:creator>
    </item>
    <item>
      <title>AI Phishing Attack Prevention Strategies: How AI Identifies and Limits Human Risk</title>
      <link>https://blog.knowbe4.com/ai-phishing-attack-prevention-strategies-how-ai-identifies-and-limits-human-risk</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/ai-phishing-attack-prevention-strategies-how-ai-identifies-and-limits-human-risk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/AI-Assistant-Brain-Processor.jpeg" alt="AI Phishing Attack Prevention Strategies: How AI Identifies and Limits Human Risk" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;AI is making phishing attacks easier to create and scale. Tasks that once required manual effort can now be automated, allowing attackers to generate realistic messages, launch campaigns, and adapt tactics quickly to evade security controls. In fact, KnowBe4’s &lt;a href="https://blog.knowbe4.com/hubfs/Phishing-Threat-Trends-2025_Report.pdf"&gt;2025 Phishing Threat Trends Report&lt;/a&gt; found that more than 73% of phishing emails analyzed in 2024 showed signs of AI involvement.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/ai-phishing-attack-prevention-strategies-how-ai-identifies-and-limits-human-risk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/AI-Assistant-Brain-Processor.jpeg" alt="AI Phishing Attack Prevention Strategies: How AI Identifies and Limits Human Risk" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;AI is making phishing attacks easier to create and scale. Tasks that once required manual effort can now be automated, allowing attackers to generate realistic messages, launch campaigns, and adapt tactics quickly to evade security controls. In fact, KnowBe4’s &lt;a href="https://blog.knowbe4.com/hubfs/Phishing-Threat-Trends-2025_Report.pdf"&gt;2025 Phishing Threat Trends Report&lt;/a&gt; found that more than 73% of phishing emails analyzed in 2024 showed signs of AI involvement.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fai-phishing-attack-prevention-strategies-how-ai-identifies-and-limits-human-risk&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 09 Apr 2026 17:00:00 GMT</pubDate>
      <guid>https://blog.knowbe4.com/ai-phishing-attack-prevention-strategies-how-ai-identifies-and-limits-human-risk</guid>
      <dc:date>2026-04-09T17:00:00Z</dc:date>
      <dc:creator>KnowBe4 Team</dc:creator>
    </item>
    <item>
      <title>Phishing Campaign Impersonates Palo Alto Networks Recruiters</title>
      <link>https://blog.knowbe4.com/cyberheistnews-volume-16-14a-alert-phishing-campaign-impersonates-palo-alto-networks-recruiters</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/cyberheistnews-volume-16-14a-alert-phishing-campaign-impersonates-palo-alto-networks-recruiters" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CHNNewsletter_Thumbnail.png" alt="Phishing Campaign Impersonates Palo Alto Networks Recruiters" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Threat actors are impersonating Palo Alto Networks recruiters to target job seekers, according to researchers with Palo Alto’s Unit 42 security team. “These attacks specifically target senior-level professionals by leveraging scraped LinkedIn data to craft highly personalized lures,” the researchers write.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/cyberheistnews-volume-16-14a-alert-phishing-campaign-impersonates-palo-alto-networks-recruiters" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CHNNewsletter_Thumbnail.png" alt="Phishing Campaign Impersonates Palo Alto Networks Recruiters" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Threat actors are impersonating Palo Alto Networks recruiters to target job seekers, according to researchers with Palo Alto’s Unit 42 security team. “These attacks specifically target senior-level professionals by leveraging scraped LinkedIn data to craft highly personalized lures,” the researchers write.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fcyberheistnews-volume-16-14a-alert-phishing-campaign-impersonates-palo-alto-networks-recruiters&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Phishing</category>
      <category>Cybercrime</category>
      <pubDate>Thu, 09 Apr 2026 13:00:01 GMT</pubDate>
      <guid>https://blog.knowbe4.com/cyberheistnews-volume-16-14a-alert-phishing-campaign-impersonates-palo-alto-networks-recruiters</guid>
      <dc:date>2026-04-09T13:00:01Z</dc:date>
      <dc:creator>KnowBe4 Team</dc:creator>
    </item>
    <item>
      <title>Voice Phishing is a Growing Social Engineering Threat</title>
      <link>https://blog.knowbe4.com/voice-phishing-is-a-growing-social-engineering-threat</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/voice-phishing-is-a-growing-social-engineering-threat" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CHNNewsletter_Thumbnail.png" alt="Voice Phishing is a Growing Social Engineering Threat" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Voice phishing (vishing) overtook email-based &lt;a href="https://www.knowbe4.com/resource-center/phishing"&gt;phishing&lt;/a&gt; as a top initial intrusion vector in 2025, according to a new report from Mandiant. Notably, vishing is live and interactive, giving the attacker more control over the social engineering objectives.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.knowbe4.com/voice-phishing-is-a-growing-social-engineering-threat" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.knowbe4.com/hubfs/CHNNewsletter_Thumbnail.png" alt="Voice Phishing is a Growing Social Engineering Threat" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Voice phishing (vishing) overtook email-based &lt;a href="https://www.knowbe4.com/resource-center/phishing"&gt;phishing&lt;/a&gt; as a top initial intrusion vector in 2025, according to a new report from Mandiant. Notably, vishing is live and interactive, giving the attacker more control over the social engineering objectives.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=241394&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.knowbe4.com%2Fvoice-phishing-is-a-growing-social-engineering-threat&amp;amp;bu=https%253A%252F%252Fblog.knowbe4.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Phishing</category>
      <category>Cybercrime</category>
      <pubDate>Wed, 08 Apr 2026 13:00:04 GMT</pubDate>
      <guid>https://blog.knowbe4.com/voice-phishing-is-a-growing-social-engineering-threat</guid>
      <dc:date>2026-04-08T13:00:04Z</dc:date>
      <dc:creator>KnowBe4 Team</dc:creator>
    </item>
  </channel>
</rss>
