Security Awareness Training Blog

Cybersecurity Blog

Get the latest news in cybersecurity with in-depth coverage and analysis of current statiistics, developments and how to stay ahead of current threats.

What's in it for the Social Engineers?

A necessary skill for any successful hacker is an understanding of how the human mind works, according to a post in IT Pro. Knowing how to manipulate technology is a major part of the ...
Continue Reading

Last Chance to Try the Free Domain Spoof Test to Win $500 Amazon Gift Card!

Are you aware that one of the first things hackers try is to see if they can spoof the email address of someone in your own domain?
Continue Reading

[Heads Up] Iran Has Launched Evil New Malware That Wipes Your Windows Workstations

Zak Doffman posted: "Iran’s state-sponsored hackers have deployed a new strain of malicious malware, warns IBM, which has been aimed at the “industrial and energy sectors” in the Middle ...
Continue Reading

Spotting the Gaps: Is Your Traditional Security Stack Giving You a False Sense of Security?

Endpoint security, firewalls, VPNs, authentication systems… we’ve all got them. But do they really provide the comprehensive level of security your organization needs to keep the bad guys ...
Continue Reading

Distracted in Target

It was an average Sunday…laundry, errands, football. I was standing in the checkout line at my favorite store, Target, when my son texted to remind me to get the Tostitos Scoop chips, he ...
Continue Reading

Global Utilities See Cyberattacks as Greater Threat to Operations than IT with Half Experiencing Outages

Global industrial organizations are seeing and feeling the effects of cyberattacks, recognizing the material impact potential upon operations.
Continue Reading

Shooting Ourselves in the Foot: The Biases We All Have

We humans like to believe that we are rational beings, fully in control of our decisions and actions. But psychologists and behavioral economists disagree. They argue that we are — by ...
Continue Reading

Click Confessions of a Security Expert

As a “human security” expert, I used to take a lot of pride in my well-honed security hygiene. Yeah… that all ended back in early 2017 when I joined KnowBe4. You see, up until that time, ...
Continue Reading

Companies Expected to Lose $5.2 Trillion in Opportunity Due to Cyber Attacks Over the Next Five Years

The big business of cyberthreats gets stamped with a huge price tag by professional services company Accenture in their latest report on Securing the Digital Economy.
Continue Reading

Get Your Hands On KnowBe4's Important 2020 Security Threats and Trends Survey Results *First*

Once a year, KnowBe4 runs its Security Threats and Trends Survey. We’re polling IT and Security executives, administrators and professionals like yourself on what technology and business ...
Continue Reading

Interested in cybersecurity law and policy?

Check out “Caveat,” the CyberWire's newest weekly podcast addressing cybersecurity law and policy, with a particular focus on surveillance and digital privacy. This podcast is hosted by ...
Continue Reading

Half of M&A Cyber Audits Uncover Undisclosed Breaches That Derail Deals

Cybersecurity diligence performed prior to a merger or acquisition often uncovers weaknesses in an organization’s security stance, which can spell doom for the company being purchased and ...
Continue Reading

SIM Card Attack May Affect Over 1 Billion Mobile Phones Worldwide

Using SMS messaging, attackers can use phishing tactics to hijack mobile devices using a legacy piece of SIM code, called the S@T Browser, to execute commands as part of a more ...
Continue Reading

Bogus eCommerce Sites Spinning Up for Holidays

The number of potential e-commerce phishing domains registered in the first nine months of 2019 is more than six times the amount registered during the same period in 2016, a report from ...
Continue Reading

Reuters: "Hackers hit UK political parties with back-to-back cyberattacks"

LONDON (Reuters) - Hackers hit Britain’s two main political parties with back-to-back cyberattacks on Tuesday, sources told Reuters, attempting to force political websites offline with a ...
Continue Reading

LIVE DEMO: Identify & Respond to Email Threats Faster with PhishER

Your users are likely already reporting potentially dangerous emails in some fashion within your organization. The increase of this email traffic can present a new problem!
Continue Reading

Lower Your Business Risk with Best Practice Data Privacy Impact Assessments (DPIA's)

Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to ...
Continue Reading

The Most Fascinating Layer in a SOC: The Human Layer

During my travels, the topic of security operations comes up often. And nearly every security professional I talk to is either contemplating or already implementing some form of ...
Continue Reading

Heads-Up: Malicious Actors Want to Join Your Team!

Microsoft Teams has seen rapid adoption in the three years since it was released back in 2016, becoming by some estimates the second most used business collaboration tool after Skype. ...
Continue Reading

The Cold War Was Like Being Hit With A Club. Cyber War is Being Stung With A Syringe

America's Cold War with Russia was fought with the threat of mutually assured destruction using atomic weapons. Being hit with a nuke is very much like being whacked over the head with a ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews