Security Awareness Training Blog

Phishing Blog

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Black Basta Ransomware Uses Phishing Flood to Compromise Orgs

Rapid7 reports an interesting social engineering scheme that easily bypasses content filtering defenses and creatively uses a fake help desk to supposedly “help” users put down the attack.
Continue Reading

Phishing and Pretexting Dominate Social Engineering-Related Data Breaches

New data shows that despite the massive evolution of the cybercrime economy, threat actors are sticking with the basics in social engineering attacks, with a goal at stealing data.
Continue Reading

FBI Warns of AI-Assisted Phishing Campaigns

The US Federal Bureau of Investigation’s (FBI’s) San Francisco division warns that threat actors are increasingly using AI tools to improve their social engineering attacks.
Continue Reading

How Come Unknown Attack Vectors are Surging in Ransomware Infections?

Trend analysis of ransomware attacks in the first quarter of this year reveals a continual increase in the number of "unknown" initial attack vectors, and I think I understand why.
Continue Reading

Attackers Leveraging XSS To Make Phishing Emails Increasingly Evasive

Attackers are exploiting Reflected Cross-Site Scripting (XSS) flaws to bypass security filters, according to a new report from Vipre. This technique allows attackers to send benign links ...
Continue Reading

Ransomware Detection Time Shortens by 44% as Organizations Attempt to Keep Up with Attackers

New data shows organizations are improving their ability to detect and respond to ransomware attacks, but is it fast enough to make a difference and stop attacks?
Continue Reading

Phishing-as-a-Service Platform LabHost Disrupted by Law Enforcement Crackdown

One of the largest phishing-as-a-service platforms, LabHost, was severely disrupted by law enforcement in 19 countries during a year-long operation that resulted in 37 arrests.
Continue Reading

Phishing Reports in Switzerland More Than Doubled Last Year

Switzerland’s National Cyber Security Centre (NCSC) received more than 30,000 reports of cyber incidents in the second half of 2023, more than double the amount received in the second ...
Continue Reading

Verizon: Nearly 80% of Data Breaches Involve Phishing and the Misuse of Credentials

Innovative analysis of data breaches shows which attack vectors are being used and how they’re enabled, highlighting the roles phishing and credentials play.
Continue Reading

Credential-Harvesting Campaign Impersonates Fashion Retailer Shein

A phishing campaign is impersonating fashion retailer Shein in an attempt to steal users’ credentials, according to researchers at Check Point.
Continue Reading

The Education Sector Experienced the Highest Number of Data Breaches in 2023

New data from Verizon makes it clear that the Education sector is under attack, but also breaks down which threat actions and patterns are used most.
Continue Reading

Introducing The New KnowBe4.com

I'm excited to unveil our newly redesigned website at knowbe4.com! The team has worked hard to create a sleek, modern design with improved navigation and new features to better serve you ...
Continue Reading

Verizon: The Percentage of Users Clicking Phishing Emails is Still Rising

The long-awaited annual Verizon Data Breach Investigations Report is out, and it’s made very clear that users continue to be a problem in phishing attacks.
Continue Reading

Analysis Shows 2023 to be “Worst Year for Phishing on Record”

Newly-released data highlights our worst fears about the prevalence of phishing, and some glimmer of hope that the good guys may be winning the fight.
Continue Reading

[CASE STUDY] Healthcare Organization Hardens Employee Defenses Against Insidious Callback Phishing Attacks

A major U.S. healthcare provider significantly reduced their employees' susceptibility to callback phishing attacks after using KnowBe4's callback phishing simulation and training ...
Continue Reading

Phishing Failures: How Not to Phish Your Users

This blog was co-written by Javvad Malik and Erich Kron. Let’s dive into the cautionary world of phishing simulations gone wrong. You know, those attempts to train users not to fall for ...
Continue Reading

How New College Graduates Can Avoid Increasingly Personalized Job Scams

For many fresh out of college, the drive to land that first professional role is a top priority. Yet, new graduates can be exposed to sophisticated scams that can jeopardize not just ...
Continue Reading

Targeted Smishing Attacks by Threat Group “The Com” On The Rise

Cyber activity by the group "The Com," which leverages (SIM) swapping, cryptocurrency theft, swatting, and corporate intrusions, is increasing.
Continue Reading

The Art of Huh?

One of the best things you can teach yourself, your family, and your organization is how to recognize the common signs of phishing and how to mitigate and appropriately report it.
Continue Reading

Phishing Campaigns Spoof the U.S. Postal Service

Researchers at Akamai have found that phishing sites impersonating the U.S. Postal Service get as much traffic as the real USPS website.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews