Why People Don't Learn (It's Not Always Their Fault)
IT and security managers often fail to understand how well their employees actually absorb cybersecurity training, according to a survey from Mimecast and Forrester Consulting. The survey ...
Read the latest news about KnowBe4, company announcements, new product releases and updates, awards and recognitions.
IT and security managers often fail to understand how well their employees actually absorb cybersecurity training, according to a survey from Mimecast and Forrester Consulting. The survey ...
Check out new training content added to the KnowBe4 ModStore in the month of May.
Because of the nature of ransomware attacks and the mass numbers of workers at home, anti-malware vendor Emisoft believes we’re going to see a rise once work returns to normal.
There are bad guys in Australia that have given away money in order to use social engineering and harass people with abusive transaction descriptions that appear in online banking ...
A new threat intelligence report on doxxing, researched by cybersecurity experts at Kivu, reveals that the majority of attacks occur in the U.S., with companies in the consumer sector ...
Two more Australian companies have been hit by attackers using the Mespinoza/Pysa Windows ransomware, the same malware that was used to take down the Australian money management firm ...
Researchers at Lastline warn that attackers are increasingly utilizing Excel 4[.]0 macros to deliver malware while avoiding detection by security products. Excel 4[.]0 (XL4) macros were ...
Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by the bad guys? Probably not. Cybercriminals have ...
Lots of new data is now just coming out of the woodwork demonstrating some of the harsh realities of having employees work from home without proper security in place.
Working from home has its advantages. But, according to new data, one of them isn’t keeping the organization secure.
What a year 2020 has been. We have not even gotten half way into the year and we have dealt with a global pandemic, potential murder hornets, protests and riots and even the possibility ...
Scammers are exploiting the increased demand for online shopping by setting up spoofed supermarket websites, Teiss reports. Researchers at Mimecast recently found thirty websites ...
Surely Bond villains only exist in movies -- I mean people aren’t truly evil are they? Especially ones who sit behind a computer. This was part of a discussion I was having with my ...
Ransomware variants shifting tactics to include extortion may be cause for organizations to treat them as data breaches and, therefore, quickly notify affected parties.
Most organizations don’t place enough focus on the human elements of cybersecurity, according to Stephen A. Wilson, Dean Hamilton, and Scott Stallbaum from consulting firm Wilson Perumal ...
Even the Supreme Court isn’t safe from brand impersonation in this scam intent on getting victims to click on a link to a supposed subpoena to attend a hearing.
This year’s much-anticipated Verizon Data Breach Investigations Report sheds some light on how cybercriminals use phishing to achieve their goal of stealing data.
In an apparent attack intent on stealing intellectual property, EasyJet announced that their customer’s personal data had been “accessed” as part of the attack.
Funds transfer fraud, also known as business email compromise (BEC), is a much more widespread problem than it seems, according to lawyers at Ice Miller LLP. The attorneys believe this ...
Researchers at Abnormal Security warn that a phishing campaign is trying to steal LogMeIn remote desktop credentials. The attackers are sending phishing emails that purport to come from ...