Security Awareness Training Blog

Cybersecurity Blog

Get the latest news in cybersecurity with in-depth coverage and analysis of current statiistics, developments and how to stay ahead of current threats.

PDF Files Can Be Abused to Steal Windows Credentials

PDF files can be weaponized by malicious actors to steal Windows credentials (NTLM hashes) without any user interaction, and only by opening a file, according to Assaf Baharav, a security ...
Continue Reading

Many of us will be at the RSA Conference in SanFran this week. Here are some quick tips!

Lance Spitzner said: Eat breakfast, it may be the last meal you get that day. Schedule the most important meetings in the morning. RSA gives you a back-pack. Don't use it at the con, ...
Continue Reading

Best-Funded US Cyber Security Startups By State [InfoGraphic]

We were just made aware of this very interesting map created by CBInsights. It lists the most well-funded cyber security companies in each US State as of Feb 2, 2018. To our pleasant ...
Continue Reading

The Malicious Use of Artificial Intelligence in Cyber Security

Kevin Townsend wrote a great article about AI in SecurityWeek, looking at the current state of affairs and the expected near future, based on a recent important scientific paper titled: ...
Continue Reading

Accenture Cyber Security Survey: 18% of Health Employees Would Sell Confidential Data

Those who said they were willing to sell the data would do so for as little as between $500 and $1,000. Alexandia Wilson at HealthLeadersMedia had some disconcerting news. "Patients trust ...
Continue Reading

Insider Trading Can Pose Cyber Security Risks Says SEC Chair Clayton

Securities and Exchange Commission Chair Jay Clayton warned today insider trading by executives from undisclosed hacks and weak protections can pose cyber security risks to the reputation ...
Continue Reading

Global Cyber Security Risk Perception: Highest Management Priorities

Few organizations are highly confident in their ability to manage the risk of a cyber-attack, despite viewing cybersecurity as a top risk management priority, according to a survey ...
Continue Reading

WHAT IS “REASONABLE CYBER SECURITY” AND HOW DO COURTS VIEW IT?

Shawn Tuma is an attorney with an internationally recognized reputation in cybersecurity, computer fraud, and data privacy law. He is a Cybersecurity & Data Privacy Attorney at Scheef ...
Continue Reading

UK Warns Critical Industries to Boost Cyber Security or Face Hefty Fines

The UK government has warned that Britain's most critical industries must boost their cybersecurity or face potentially hefty fines under the EU's Networks and Information Systems ...
Continue Reading

Spend One Minute And Look At These Phishing Graphs

In the first quarter of 2018, after 7 years of helping our customers to enable their employees to make smarter security decisions and having reached the milestone of 15,000 customers, we ...
Continue Reading

How To Create A Security Culture in 2018

Ever heard: "If it was easy, everyone would do it" ? Creating a better security culture in your organization has a few challenges. Let's have a look at them, see how you can overcome ...
Continue Reading

How To Explain Meltdown And Spectre To Your C-Level and employees

OK, 2018 has just started and it has totally borked all networks in the whole world. That's a fine mess we're in to start off the year. :-) Meltdown and Spectre are CPU hardware design ...
Continue Reading

Book Review: A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using

Excellent book about InfoSec that has everything you need to know and nothing you don't. A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using by ...
Continue Reading

[On-Demand Webinar] Six Cybersecurity Trends Organizations Need to Watch for in 2018

Watch this insider’s perspective of cybersecurity trends to expect in 2018 from our founder Stu Sjouwerman. The list of six predictions are founded on KnowBe4’s deep insight into threats ...
Continue Reading

Spy Vs. Spy? WikiLeaks Says CIA Impersonated Kaspersky Lab

Wow, the plot thickens. Attribution indeed is a very murky business. According to WikiLeaks, its analysis revealed that by using these fake certificates, the CIA made it look like data ...
Continue Reading

How to sell cybersecurity to your executive team

Scott Schlimmer wrote a great post at CSO about the constant battle between profitable business investments and “unprofitable” security investments to protect the current bottom-line.
Continue Reading

Fancy Bear Goes Phishing For DC Cybersecurity Conference Attendees

Want to target a large swath of cybersecurity professionals in one go? Just crash their "cyber" party with a decoy document. So goes the modus operandi for an advanced persistent threat ...
Continue Reading

New Worry For CEOs: A Career-Ending Cybersecurity Breach

Corporate chiefs get more involved in defense against hackers, fearing a cybersecurity breach could cost their jobs, hurt their businesses. Vanessa Fuhnmans wrote an excellent heads-up ...
Continue Reading

This Week's Five Most Popular HackBusters Posts Sept 16

There is an enormous amount of noise in the security space, so how do you know what people really talk about and think is the most important topic? Well, we created the Hackbusters site ...
Continue Reading

Microsoft Wakes Up To The Fact That Cyber Security Risk Is A Business Risk [VIDEO]

The 800-pound Redmond Gorilla asks: "Should your security focus be on systems or people?" They wrote: "In the latest Modern Workplace episode, “Cyber Intelligence—The Human Element,” we ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews