Security Awareness Training Blog

Cybercrime Blog

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

Does DoubleAgent Turn Antivirus Into Malware? We Are Calling BS On That.

It was all over the press. Initially reported by Bleepingcomputer and picked up by sites like Endgadget, they all went gaga over a new technique that allows the bad guys to take over your ...
Continue Reading

Mandiant M-Trends 2017: "Cybercrime Skills Now On Par With Nation States"

There was some good news reported in Mandiant's M-Trends 2017 report, but this was heavily outweighed by a lot of very bad news. Mandiant, which is a Fireye company, found that in 2016 ...
Continue Reading

Former NSA Director Michael Hayden: "We have a Russia Problem"

I have been saying this here for the last few years, but if you get it confirmed by a former NSA director, that's nice to hear. The Wall Street Journal just reported that President Barack ...
Continue Reading

Russian Central Bank Loses 2 Billion Rubles in Cyberheist

Reuters reported that hackers stole more than 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank, the bank said on Friday. “We can’t say exactly when, ...
Continue Reading

The Top Five Names In Cybersecurity

Looking for the top names in cybersecurity? Look no further than the Cybersecurity 500 list of the world’s hottest and most innovative cybersecurity companies: ...
Continue Reading

10 Ways To Avoid Holiday Scams

With the biggest cybercriminal hacking holidays of the year upon us, it's time for a reminder of red flags to pay attention to when shopping either online or in brick-and-mortar stores.
Continue Reading

New Version of iSpy Trojan Steals Your Software Licenses

Earlier this year we posted about Jsocket, a highly malicious Trojan that we spotted being delivered through phishing emails shared with us via the Phish Alert Button (PAB). Although ...
Continue Reading

Coming Soon to an Inbox Near You: A New Type Of Tech Support Scam

By Eric Howes, KnowBe4 Principal Lab Researcher. Yesterday we spotted an unusual phishing email that we'd like to share with readers. If nothing else, it tells us that the increased ...
Continue Reading

Cyber Attack Maps...Accurate Or Just Eye Candy?

Here are the top 5 Cyber Attack Maps found in Google. They all seem to show the cyber attacks in a slightly different perspective. This is the Norse attack map as an example:
Continue Reading

14 Ways A Cyberheist Hits Your Bottom Line: Total Cost Of A Hack

What is the true cost of a data breach? After analyzing a health plan breach, research firm Deloitte says the toll of a cyberheist is significantly underestimated. The firm in a report ...
Continue Reading

Scam Of The Week: Orlando Nightclub Phishing Attacks

Just when you think they cannot sink any lower, criminal internet scum is now exploiting the tragedy in Orlando. Unfortunately, from this spot I have been warning about these lowlifes ...
Continue Reading

Looks Like 8 More Cyberheists By North Koreans

Gottfried Leibbrandt, chief executive of the world’s largest interbank funds-transfer system SWIFT, has said repeatedly that the prospect of cybercrime is what keeps him awake at night. ...
Continue Reading

[INFOGRAPHIC] Don't Be The Victim Of A Cyberheist

We have created a new infographic for your users, as part of your ongoing security awareness training program. It's a few good reminders how to stay safe online, and to keep their ...
Continue Reading

Are North Koreans The Bad Guys Behind Brazen Cyberheists?

In March, we posted a story about a cyberheist where hackers tried to steal a cool 1 Billion dollars from the Bangladesh Central Bank, but a simple typo thwarted most of their attempt. ...
Continue Reading

Shields Up! New DMA Locker V4 Unleashes Major Ransomware Assault

DMA Locker is an excellent example of cybercrime's furious speed of innovation. Version 1 showed up in January 2016, and V2 a month later, but the implementation of the encryption ...
Continue Reading

Users Really Do Plug in USB Drives They Find

Been suspecting that your users are plugging in any USB stick they find, to see what is on it? Well, you are right, they actually do that. Fresh scientific research by Google, and the ...
Continue Reading

2016 Will Show Increase In Shareholder Cybersecurity Lawsuits

NYSE Governance Services and Infosec company Veracode recently published results of a survey over of 276 board members titled "Cybersecurity and Corporate Liability". A massive 60 percent ...
Continue Reading

Banks Do Not Pay You Back If You Get Hit With A Cyberheist

I was very happy to see that NPR has jumped on a story I have been trying to get out for a while. John Ydstie has a new example, where he shows the incredible hassle and disappointment ...
Continue Reading

Blackhat 2015 What Was Hot And Scary?

It was another great BlackHat. If you could not make it, here is a roundup of things that I thought were particularly interesting from the perspective we have here at KnowBe4. It's a ...
Continue Reading

OPM: 'Victim-as-a-Service' Provider

Unconscionable. I would even say callous and criminal negligence, all on the current administration's watch, of the highly confidential and very private information of the people working ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews