Security Awareness Training Blog

Phishing Blog

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

A Brief History of Phishing, and Other Forms of Social Engineering

Social engineering attacks have a very long history, though the Internet has made it easier to launch these attacks en masse, according to Sean McNee at DomainTools. McNee points to an ...
Continue Reading

QR Code Phishing on the Rise: The Alarming Findings From the Hoxhunt Challenge

As the digital landscape continues to evolve, so do the tactics of cybercriminals. The Hoxhunt Challenge, a comprehensive study conducted across 38 organizations spanning nine industries ...
Continue Reading

Phishing-as-a-Service: As Simple As Uploading A Logo

Researchers at Fortra are tracking “Strox,” one of the most popular phishing operations of the past two years. Users of Strox phishing kits can easily create phishing campaigns by simply ...
Continue Reading

CISA, NSA, FBI, and MS-ISAC Release Phishing Prevention Guidance

October 18, 2023, the Cybersecurity Infrastructure and Security Agency (CISA), the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and the Multi-State ...
Continue Reading

Phishing Attacks Surge By 173% In Q3, 2023; Malware Threats Soar By 110%

A new report from Vade Secure has found that phishing attacks rose by 173% in the third quarter of 2023, while malware threats have increased by 110%.
Continue Reading

Summit Sabotage: Malicious Phishing Campaign Hits Female Political Leaders Using Social Engineering

A threat actor dubbed “Void Rabisu” used social engineering to target attendees of the Women Political Leaders (WPL) Summit that was held in Brussels from June 7 to 8, 2023, Trend Micro ...
Continue Reading

Phishing Tests Start The Virtuous Cycle Of A Strong Security Culture

Phishing tests are the catalyst to achieve a sustainable security culture within your organization. They are actually the start of a virtuous cycle that helps you move up to the highest ...
Continue Reading

9 in 10 CISOs Report at Least One Disruptive Cyberattack in the Last Year

A new report sheds light on whether CISOs have been the victim of a cyber attacks, if they're every paid a ransom, their greatest cyber concerns, and much more.
Continue Reading

53% of Organizations Experienced Cyber Attacks

As increasing percentages of businesses experience cyberattacks, new data provides details on where the most organizational risk lies.
Continue Reading

Should You Use Controversial Simulated Phishing Test Emails?

The Wall Street Journal recently published an article about using highly-emotionally charged, “controversial”, subjects in simulated phishing tests. Controversial topic examples include ...
Continue Reading

New Research: Phishing Remains the Most Popular Technique for Bad Actors

A report from Trustwave notes that phishing remains one of the most popular and effective techniques for attackers to gain access to organizations.
Continue Reading

Harvested Credentials Are Put Up for Sale Monthly on the Dark Web at a Rate of 10,000 a Month

Credential harvesting has become a business in and of itself within the cybercrime economy. New insight from Microsoft details the types of attacks your organization should watch out for.
Continue Reading

[INFOGRAPHIC] KnowBe4’s SecurityCoach: Top 10 Integrations

Real-time security coaching helps improve your organization’s security culture by enabling real-time coaching of your users in response to risky security behaviors.
Continue Reading

Smishing Triad Threat Actor Sets Its Sights on the UAE

Resecurity warns that the Smishing Triad threat actor has “vastly expanded its attack footprint” in the United Arab Emirates (UAE).
Continue Reading

One Out of Five Organizations Must Improve Their Security Posture to be Eligible for Cyber Insurance

As insurers become more educated on what a “secure organization” looks like, they are tightening their requirements that puts the onus on organizations to be more secure.
Continue Reading

Energy Sector Experiences Three Times More Operational Technology Cybersecurity Incidents Than Any Other Industry

While industries like financial services and healthcare tend to dominate in IT attacks, the tables are turned when looking at Operational Technology (OT) cyber attacks – and the energy ...
Continue Reading

Stay a Step Ahead of your #1 Downtime Threat - Business Email Compromise

A new report from Secureworks has found that business email compromise (BEC) remains “one of the most financially damaging online crimes overall for orgs” in 2023. The security firm’s ...
Continue Reading

[Risky New Data] More than Half of Phishing Scams Now Use Obfuscation

A new report shows staggering phishing trends using obfuscation techniques that should make any organization feel worried.
Continue Reading

Senior Executives Beware: The Rise of EvilProxy Phishing Campaigns

Menlo Security warns that a social engineering campaign is using the EvilProxy phishing kit to target senior executives across a range of industries, including banking and financial ...
Continue Reading

Malicious URLs In Phishing Emails: Hover, Click and Inspect Again

The most often recommended piece of anti-phishing advice is for all users to “hover” over a URL link before clicking on it. It is great advice.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews