Inside Our 'Human Risk: In-Person Experience' in Leeds

Last week, our KnowBe4 Leeds office opened its doors to a group of security professionals for an immersive, full-day deep dive into the evolving landscape of human risk.

Digital Cleanup: It’s Not Just Your Files, It’s Your Brain

Digital Cleanup Day might be seen as a digital chore: delete old files, clear the inbox, reduce your carbon footprint. It’s framed as a technical exercise. But digital cleanup isn't only ...

Shipping-Themed Phishing Scams Target the Middle East and Africa

A surge in shipping-related phishing scams is targeting the Middle East and Africa (MEA) region, according to researchers at Group-IB.

So Many AI Attacks, It Made Quantum Seem Easy

As I was writing my latest book, How AI and Quantum Impact Cyber Threats and Defenses, I was hit by how many theoretical and real attacks there are involving AI. There are attacks ...

From Phishing to AI Agents: Can We Design for Digital Mindfulness?

Anyone who knows me knows I’m passionate about mindfulness. Because I genuinely believe it makes us better humans. But also, because I have one of those brains that desperately needs it. ...

FBI: Phishing Attacks Are Impersonating City and County Officials

The US Federal Bureau of Investigation (FBI) has issued an advisory warning of a phishing campaign that’s impersonating city and county officials to send phony requests for permit fees.

Exposing the Kroll Crypto Wallet Scam

I’ve been contacted by the real Kroll (www.kroll.com) a few times over the last few years regarding various real class action lawsuits they are involved in, including as recently as a few ...

[Arms Race] Hackers Use AI. Here’s Why Defenders Must Too

Yes, you need AI to defeat AI. Long-time followers of mine know that I am not an AI hype person. Some people might even call me an AI critic. I prefer to call myself an AI realist. I do ...

Fake Calendar Invitations Move to Microsoft Outlook

Fake calendar invites have been a problem on Gmail for years. Even though they could appear on other calendar services, I hadn’t seen or read about a lot of it. Gmail had been taking the ...

Phishing on Messaging Apps: How Attackers Use WhatsApp, Teams, Slack, and SMS

Messaging platforms are now a major vector for phishing and other social engineering attacks, according to a new report from NCC Group’s Fox-IT.

TurboTax SMS Scam

It is tax season in the United States and that means plenty of tax scams. I recently received these SMS messages.

Common Facebook Scam Method

A friend posted this on Facebook and it came up on my feed.

Fake Video Meeting Invites Trick Users Into Installing RMM Tools

Threat actors are using phony meeting invites for Zoom, Microsoft Teams, Google Meet, and other video conferencing applications to trick users into installing remote monitoring and ...

Introducing the AIDA Orchestration Agent: Always-On Human Risk Management Has Arrived

Social engineering remains the most reliable way into an organization—and attackers are getting better at it every day.

Humans Will Give AI Anything If You Make It Sound Cool Enough

There's a beautiful moment happening right now, and by "beautiful" I mean "horrifying in that can't-look-away-from-the-car-crash sense”.

AI-Assisted Social Engineering Attacks Continue to Rise

Social engineering remained the top initial access vector for cyberattacks in 2025, with increasing assistance from AI tools, according to a report from ThreatDown. The researchers warn ...

Report: AI-Driven Fraud Surged by 1200% in December 2025

AI-driven fraud attacks spiked by more than 1200% in December 2025, according to a new report by Pindrop Security. Threat actors are using AI to assist in every stage of the attack, from ...

Your Password Needs To Be 25 Characters or Longer Due to AI and Quantum Attacks

Prior to my further research into AI and quantum for my latest book, How AI and Quantum Impact Cyber Threats and Defenses, I had pretty solid password policy recommendations:

Warning: Attackers Are Using DKIM Replay Attacks to Bypass Security Filters

Cybercriminals are abusing legitimate invoices and dispute notifications from popular services to send scam emails that bypass security filters, according to researchers at Kaseya’s INKY. ...

Welcome to the Blur: Designing Security That Works With, Not Against, AI Adoption

There's a moment in every security professional's career when they realise the game has fundamentally changed. Mine came last Tuesday at 3:47 PM, watching my colleague Erich argue with an ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.