Security Awareness Training Blog

Cybersecurity Blog

Get the latest news in cybersecurity with in-depth coverage and analysis of current statiistics, developments and how to stay ahead of current threats.

Will You Get Spoofed During The Holidays? Try the Free Domain Spoof Test to Win $500 Amazon Gift Card!

Are you aware that one of the first things hackers try is to see if they can spoof the email address of someone in your own domain? Now they can launch a "CEO fraud" spear phishing attack ...
Continue Reading

Get Your Hands On KnowBe4's Important 2020 Security Threats and Trends Survey Results *First*

Once a year, KnowBe4 runs its Security Threats and Trends Survey. We’re polling IT and Security executives, administrators and professionals like yourself on what technology and business ...
Continue Reading

Interested in cybersecurity law and policy?

Check out “Caveat,” the CyberWire's newest weekly podcast addressing cybersecurity law and policy, with a particular focus on surveillance and digital privacy. This podcast is hosted by ...
Continue Reading

Half of M&A Cyber Audits Uncover Undisclosed Breaches That Derail Deals

Cybersecurity diligence performed prior to a merger or acquisition often uncovers weaknesses in an organization’s security stance, which can spell doom for the company being purchased and ...
Continue Reading

SIM Card Attack May Affect Over 1 Billion Mobile Phones Worldwide

Using SMS messaging, attackers can use phishing tactics to hijack mobile devices using a legacy piece of SIM code, called the S@T Browser, to execute commands as part of a more ...
Continue Reading

Bogus eCommerce Sites Spinning Up for Holidays

The number of potential e-commerce phishing domains registered in the first nine months of 2019 is more than six times the amount registered during the same period in 2016, a report from ...
Continue Reading

Reuters: "Hackers hit UK political parties with back-to-back cyberattacks"

LONDON (Reuters) - Hackers hit Britain’s two main political parties with back-to-back cyberattacks on Tuesday, sources told Reuters, attempting to force political websites offline with a ...
Continue Reading

LIVE DEMO: Identify & Respond to Email Threats Faster with PhishER

Your users are likely already reporting potentially dangerous emails in some fashion within your organization. The increase of this email traffic can present a new problem!
Continue Reading

Lower Your Business Risk with Best Practice Data Privacy Impact Assessments (DPIA's)

Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to ...
Continue Reading

The Most Fascinating Layer in a SOC: The Human Layer

During my travels, the topic of security operations comes up often. And nearly every security professional I talk to is either contemplating or already implementing some form of ...
Continue Reading

Heads-Up: Malicious Actors Want to Join Your Team!

Microsoft Teams has seen rapid adoption in the three years since it was released back in 2016, becoming by some estimates the second most used business collaboration tool after Skype. ...
Continue Reading

The Cold War Was Like Being Hit With A Club. Cyber War is Being Stung With A Syringe

America's Cold War with Russia was fought with the threat of mutually assured destruction using atomic weapons. Being hit with a nuke is very much like being whacked over the head with a ...
Continue Reading

A Transformational Rant: Why People Question the Value of Security Awareness

In my last post, I spent a bit of time discussing the “technology vs. training” debate; and based on the feedback received, I can tell that this is a debate that many of you have had to ...
Continue Reading

National Cybersecurity Awareness Month is Over... Now What?

As we wrap up the 2019 National Cyber Security Awareness Month (NCSAM), let’s all agree that our work is not done. As a matter of fact, it’s far from being done. If we are really honest ...
Continue Reading

What Reese’s Peanut Butter Cups Can Teach Us About Phishing

One of the greatest inventions in modern history is the Reese’s Peanut Butter Cup. I feel sorry for any human who existed before the “age of the cup” because they never got to know the ...
Continue Reading

A Former CIA Officer Shows You How to Make Your Organization a Hard Target

Having spent over a decade as part of the CIA’s Center for Cyber Intelligence and the Counterterrorism Mission Center, Rosa Smothers knows the ins and outs of leading cyber operations ...
Continue Reading

What Footballers Wives Can Teach Us About Cybersecurity

Professional football (soccer for my American friends) is big around the world. The English Premier League is among the top in the world, attracting some of the best players, generating ...
Continue Reading

China's Criminal Hacking Spree Created A Boeing Competitor

Crowdstrike just released an explosive report which details the lengths China went to narrow the gap of the technological delta between them and market leaders like Boeing and Airbus. 
Continue Reading

I Can Phish Anyone

I’m a bit surprised by some aggressive corporate anti-phishing policies which say they will fire anyone for one accidental phishing offense. Send me the names and email addresses of the ...
Continue Reading

Cyber Risk Remains a Top Concern for Organizations While Lacking Confidence in Addressing Cyber Threats

It appears priority and ability to execute are two very different things when it comes to dealing with cyber threats, according to the latest data from Marsh and Microsoft.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews