Security Awareness Training Blog

KnowBe4 Blog

Read the latest news about KnowBe4, company announcements, new product releases and updates, awards and recognitions.

Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate the Latest Phishing Attacks

Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by the bad guys? Probably not. Cybercriminals have ...
Continue Reading

Remote Work Isn’t Good for Corporate Security (Part 2): 30% of Organizations Have Been the Victim of Phishing Scams Since the Lockdown

Lots of new data is now just coming out of the woodwork demonstrating some of the harsh realities of having employees work from home without proper security in place.
Continue Reading

Remote Work Isn’t Good for Corporate Security (Part 1): 6 in 10 Employee’s Online Accounts Have Been Compromised Since Working Remotely

Working from home has its advantages. But, according to new data, one of them isn’t keeping the organization secure.
Continue Reading

Pandemics, Killer Insects, and Riots Stir Up Cybercriminals

What a year 2020 has been. We have not even gotten half way into the year and we have dealt with a global pandemic, potential murder hornets, protests and riots and even the possibility ...
Continue Reading

Phishing for Supermarket Deliveries

Scammers are exploiting the increased demand for online shopping by setting up spoofed supermarket websites, Teiss reports. Researchers at Mimecast recently found thirty websites ...
Continue Reading

How Low Will Cybercriminals Go?

Surely Bond villains only exist in movies -- I mean people aren’t truly evil are they? Especially ones who sit behind a computer. This was part of a discussion I was having with my ...
Continue Reading

The Latest Ransomware Attacks Can Require a Data Breach Notification

Ransomware variants shifting tactics to include extortion may be cause for organizations to treat them as data breaches and, therefore, quickly notify affected parties.
Continue Reading

Human Performance as a Risk Factor

Most organizations don’t place enough focus on the human elements of cybersecurity, according to Stephen A. Wilson, Dean Hamilton, and Scott Stallbaum from consulting firm Wilson Perumal ...
Continue Reading

Supreme Court “Summons” is the Latest Phishing Attack Aimed at Stealing Your Microsoft 365 Credentials

Even the Supreme Court isn’t safe from brand impersonation in this scam intent on getting victims to click on a link to a supposed subpoena to attend a hearing.
Continue Reading

Verizon: Phishing is the Attack Vector Most Often Seen in Data Breaches

This year’s much-anticipated Verizon Data Breach Investigations Report sheds some light on how cybercriminals use phishing to achieve their goal of stealing data.
Continue Reading

EasyJet Becomes the Latest Victim of Data Breach Impacting 9 Million Customers

In an apparent attack intent on stealing intellectual property, EasyJet announced that their customer’s personal data had been “accessed” as part of the attack.
Continue Reading

What to do About BEC?

Funds transfer fraud, also known as business email compromise (BEC), is a much more widespread problem than it seems, according to lawyers at Ice Miller LLP. The attorneys believe this ...
Continue Reading

Beware of Phony LogMeIn Security Updates

Researchers at Abnormal Security warn that a phishing campaign is trying to steal LogMeIn remote desktop credentials. The attackers are sending phishing emails that purport to come from ...
Continue Reading

Phishing Campaigns Using Google Firebase Storage

Scammers are hosting phishing pages on Google Firebase Storage to bypass email security filters, Threatpost reports. Firebase is a Google-owned application development platform that ...
Continue Reading

Nearly Every Organization is More Concerned about Cybersecurity Than Before COVID-19

New data from security vendor Tripwire highlights how the shift to remote working has changed the face of cybersecurity for both the current work climate and the future.
Continue Reading

Your Next Ransomware Attack May Require Two Payments!

In a case of adding insult to injury, a new strain of ransomware is looking for one payment to decrypt, and a second payment to not publish stolen files.
Continue Reading

Preying on the Unemployed

An SMS phishing campaign has been exploiting the COVID-19 crisis by spoofing the website of a job placement agency, the New York Daily News reports. The scammers set up a website that ...
Continue Reading

Biases People Take Home With Them

Employees will naturally follow their cognitive biases unless organizations proactively engage them in security processes, according to Georgia Crossland, a Ph.D. researcher at Royal ...
Continue Reading

The Three Pillars of the Three Computer Security Pillars

Much of the world, or at least the United States, is coalescing around the NIST Cybersecurity Framework. It’s a pretty good one to follow out of the many dozens that have been proposed ...
Continue Reading

Paying the Ransom Doubles the Cost of a Ransomware Attack

The total cost of the average ransomware attack more than doubles if the victim decides to pay the ransom, according to Sophos’s State of Ransomware 2020 report. The Sophos-commissioned ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews