Security Awareness Training Blog

Cybersecurity Blog

Get the latest news in cybersecurity with in-depth coverage and analysis of current statiistics, developments and how to stay ahead of current threats.

Threat Actors are Using FINRA Impersonation For Their Attacks

DomainTools warns that a sophisticated West Africa-based fraud group is impersonating the Financial Industry Regulatory Authority (FINRA) to target users in the United States, according ...
Continue Reading

Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears

Robert Lemos at DARKReading just reported on a worrying trend. The title said it all, and the news is that more than 4% of employees have put sensitive corporate data into the large ...
Continue Reading

[On-Demand] A Master Class on Cybersecurity: Roger Grimes Teaches Data-Driven Defense

Even the world’s most successful organizations have significant weaknesses in their cybersecurity defenses, which determined hackers can exploit at will. There’s even a term for it: ...
Continue Reading

[Eye Opener] Businessweek: The Satellite Hack Everyone Is Finally Talking About

This morning, Bloomberg News pointed at a brand new article at BusinessWeek, one of their media properties. This is an excellent article that exposes the vulnerabilities when ...
Continue Reading

The Curse of Cybersecurity Knowledge

The curse of knowledge is a cognitive bias that occurs when someone is trying to communicate information to another person, but falsely assumes that the other person has the same level of ...
Continue Reading

How Artificial Intelligence Can Make or Break Cybersecurity

With the introduction of OpenAI's Chat GPT, artificial intelligence is no longer considered part of science fiction. It has presented a new problem for cybersecurity professionals, as ...
Continue Reading

Initial Access Brokers Leverage Legitimate Google Ads to Gain Malicious Access

A threat actor tracked as DEV-0569 appears to be using a combination of Google Ads and impersonated websites to compromise credentials and distribute malware to gain network access.
Continue Reading

[On-Demand] Artificial Intelligence, ChatGPT and Cybersecurity: A Match Made in Heaven or a Hack Waiting to Happen?

Artificial intelligence (AI) is no longer science fiction.
Continue Reading

[Security Masterminds] Breaking It Down to Bits & Bytes: Analyzing Malware To Understand the Cybercriminal

In our latest episode of Security Masterminds, we have the pleasure of interviewing Roger Grimes, Data-Driven Defense Evangelist for KnowBe4, who has held various roles throughout his ...
Continue Reading

How South Africa's Largest Law Firm Was Fined R5.5m for Not Educating Customers

Africa’s largest law firmordered to pay R5.5 million to a woman who fell victim to a hacking syndicate. When Judith Hawarden was buying a house, hackers changed the bank account number in ...
Continue Reading

Cyberinsurer Beazley Introduces a $45M Cyber Catastrophe Bond to Offset Risk

In a move designed to protect the insurer and allow for more cyber policies to be issued, this bond is new to cyberinsurance, but not to insurers as a whole.
Continue Reading

New Crypto Scam Targets Flipper Zero Buyers Impersonating Legitimate Shops

Interest in the handheld open-source multi-function cybersecurity tool by techies has risen to a new campaign seeking to steal crypto funds through illegitimate “sales” of the device.
Continue Reading

Ughh. FBI’s Vetted Threat Sharing Network ‘InfraGard’ Hacked

Investigative reporter Brian Krebs reported December 13, 2022 that "InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI) to build cyber and physical threat ...
Continue Reading

New Modular Attack Chain Found That Allows Attackers to Change Payloads Mid-Breach

We’ve long known developers of cyberattacks to be crafty and focus a lot of energy on obfuscation, but a new attack can shift gears midstream, delivering just the right malware.
Continue Reading

[Eye Opener] Cybersecurity Resilience Emerges as Top Priority as 62% of Companies Say Security Incidents Impacted Business Operations

Cisco's annual Security Outcomes Report shows executive support for a security culture is growing. The report identifies the top seven success factors that boost enterprise security ...
Continue Reading

Inside NATO’s Efforts To Plan For A Future Cyberwar

Maggie Miller at Politico had the scoop: "TALLINN, Estonia — Some 150 NATO cybersecurity experts assembled in an unimposing beige building in the heart of Estonia’s snow-covered capital ...
Continue Reading

Quiet Quitting Can Potentially Lead to Insider Security Risks

The phenomenon known as “quiet quitting,” in which employees become disengaged from their work while formally remaining in their jobs, can lead to serious security risks, according to Tim ...
Continue Reading

Cybersecurity incidents cost organizations $1,197 per employee, per year

This statistic is alarming and underscores the importance of having a robust cybersecurity program in place. According to the Ponemon Institute, the average cost of a data breach is $3.8 ...
Continue Reading

Holiday Package or Scam Message? Clickers Beware

As we enter the holiday season, we start getting bombarded with amazing offers and often take advantage of not only grabbing ourselves a bargain, but also stockpiling gifts for friends ...
Continue Reading

FBI director says he's 'extremely concerned' about China's ability to weaponize TikTok

Suzanne Smalley at Cyberscoop reported: "FBI Director Christopher Wray told Congress on Tuesday he is “extremely concerned” that Beijing could weaponize data collected through TikTok, the ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews