Human Risk Management Blog

Phishing

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Find out which of your users' emails are exposed before the bad guys do

Do you know how big your email attack surface really is? Open Source Intelligence (OSINT) is the collection of information from public sources on the Internet that both red teams and bad ...

Phishing Attack Compromises Spanish Defense Intranet By Foreign State

Reuters reported that a "computer virus" infected the Spanish Defense Ministry’s intranet this month with the aim of stealing high tech military secrets, El País newspaper said on ...

U.S. Healthcare Employee Engagement with Simulated Phishing Emails Drop by 67% With Repeated Exposure

A long-term phishing study involving 6 healthcare institutions shows employees are vulnerable to phishing attacks, and that they can become more vigilant through exposure.

[Heads-up] This Evil New Child Porn Phishing Attack Could Absolutely Ruin Your Life

Oh my. Bad guys have come up with a sinister new strain of blackmail/sextortion. Just when you thought things couldn't get worse, the bad guys sink lower. Eric Howes, KnowBe4's Principal ...

WOW, Phishing Attacks Are Now More Common Than Malware!

Microsoft’s security team is uniquely positioned to analyze trends in cyber security threats. Their frequent Security Intelligence Reports (SIR) are an excellent indicator of these ...

[Heads-up] Cybercriminals Are Moving To Mobile Phishing for Gift Cards Scams

Scammers are shifting to SMS to carry out business email compromise (BEC) attacks, since text messaging offers less visibility to the victim and more flexibility to the attacker, says ...

Phishing campaign targets Instagram users with fake copyright notices

A new phishing campaign targeting Instagram users is using fake copyright infringement notices to steal user credentials.

Blackmail and Sextortion Attacks Use Panic and Threats to Lure Their Victims

Preying on a victim’s fear of having “private” browsing details leaked sits at the center of these well-crafted attacks that leverage stolen or harvested passwords to establish ...

Very Few Professionals are Confident in Their Phishing Defense Assessments

New research from ISACA and Terranova Security found that just 12% of security, assurance, risk and governance professionals are confident in their ability to assess the effectiveness of ...

One in Seven Healthcare Employees Will Fall for Phishing Emails

A study recently published in the Journal of the American Medical Association highlights how vulnerable the healthcare sector is to phishing attacks, according to Jessica Davis at Health ...

The Phishing Bait is Bitcoin; the Hook is a Clipboard Hijacker

A new phishing campaign is spreading malware through emails that claim to have Bitcoin investment updates, according to My Online Security. The emails direct the victim to download an ...

[SCAM OF THE WEEK] Phishing Attack Warns About Boeing 737 Max Crashes And Infects Workstations

Large airline crashes tend to uniquely focus almost everyone's attention. Lowlife internet criminals are exploiting the fear connected to these incidents, and leverage it in phishing ...

[SCAM OF THE WEEK] New "Final Warning" Sextortion Emails State Adult Sites Infected You

Bleepingcomputer reported this week: "A new sextortion email campaign is underway that states a hacker infected the recipient's computer while they were visiting an adult web site. The ...

Three Romanian Men Commit Vishing And Smishing Crimes Worth $21 Million

Three Romanian citizens have pleaded guilty to carrying out a scheme that used recorded messages and cellphone texts to trick thousands of people into revealing their social security ...

Phishing Attack Use of Encryption Increases 400% for Malware Delivery, Communications, and Data Exfiltration

Encryption has become the norm for many cybercriminals looking to obfuscate all parts of an attack, according to Zscaler’s 2019 Cloud Security Insights Threat Report. One of the goals of ...

Software Supply Chains and Phishing Top Microsoft’s List of Greatest Cyberthreats

Microsoft’s latest Security Intelligence Report highlights the trends seen in 2018 with phishing as the preferred attack method and supply chains as a primary attack target.

Cyber Criminals use Domino Effect Chain Attacks to Leverage One Compromised Bank to Infect the Next

New details from international security company Group-IB show how cybercriminals are no longer looking to just steal from one bank. Instead they chain their attacks to improve their ...

Malware Blindness in the Enterprise

A growing percentage of cyberattacks are using encryption to avoid detection, according to a new report by Zscaler’s ThreatLabZ researchers. Their report, summarized by Help Net Security, ...

FINRA Warns of New Phishing Attack Targeting Brokerage Firms

The latest warning from Financial Industry Regulatory Authority (FINRA) puts firms on notice of yet another tailored attack seeking to gain access to firms networks.

New Facebook Phishing Scam is So Good It Will Fool Even You

Scams seeking to harvest online credentials have long tried to replicate known logon pages. But this newly found instance is just about perfect.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.