Human Risk Management Blog

Phishing

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Phishing Scammers are Planning Well into 2020

Cybercriminals are already looking to take advantage of the 2020 Tokyo Olympics. Are you thinking years out? The bad guys are.

New York State Universities Targeted by Phishing Scams

Students from Plattsburgh State and SUNY Adirondack were targeted by several types of scams over the summer, causing Plattsburgh State officials to send out warnings to the student body. ...

Phishing warning: One in every one hundred emails is now a hacking attempt

And just one mistake can compromise an entire organisation. Danny Palmer at ZDNet wrote: "One in every one hundred emails sent round the globe has malicious intent, likely to deliver ...

"Voice Phishing" in Korea This Year Already Exceeds 2017 Numbers.

The Korea JoonGang Daily reported that despite warnings from financial authorities, an average of 116 people fall victim to what is called "voice phishing" scams every day in Korea.

Weaponized IQY Files Make Excel Users an Easy Target

The Necurs botnet – most notably responsible for distributing Locky – is now pushing weaponized internet or web query (.IQY) file to evade detection and download malware.

Only 40% of Business Phishing Scams Contain Links

This latest statistic takes the spotlight off of antivirus as the protector, and puts the focus squarely in the hands of your users to stop attacks.

Mobile Phishing Campaign: Homograph Characters + "Free Flights"

Kacy Zurkus at the InfoSec group had the scoop on a campaign recently reported by Farsight Security involving an internationalized domain name (IDN) "homograph-based" phishing website ...

Think Size Matters to Hackers? It Doesn’t

The largest of organizations aren’t the only ones being hit with cyberattacks. Everyone from the SMB on up is at risk and is actively a target.

Google Warns of Govt-Backed Phishing

This latest heads-up around phishing-based warfare from a source as reputable as Google show the need to both be watchful for and responsive to phishing attacks.

New Malicious PDFs Carry Stealthy Backdoor And Exfiltrate Data Via Email

The Turla threat group, certainly Russian-speaking and widely attributed to Russian intelligence services, is back with a new phishing technique. The threat actor is distributing emails ...

Suspicious Emails Are a Problem…to the Tune of 6.4 Billion a Day!

Even with authentication, identification, and validation frameworks and solutions in place, the number of potentially malicious emails remains staggering.

Universities Are Still Targeted With Phishing Attacks By Iranian Hackers

Secureworks® Counter Threat Unit™ (CTU) researchers reported that despite indictments in March 2018, the Iranian threat group is likely responsible for a large-scale campaign that ...

Democratic National Committee Thought it was Under Attack (It Was A Red Team Phishing Test...)

The FBI received a report from the US Democratic National Committee (DNC) that unknown actors sought access to a voter database through a phishing campaign.

[Heads-up] Russian Hackers Widen Their Cyber Attacks Again With Spear Phishing Political Targets

The GRU, the Russian military intelligence spy agency which was responsible for the 2016 election cyber attacks, is at it again and are now targeting the U.S. Senate and conservative ...

Phishing is Still the #1 Cyber-Fraud Tactic

Online, e-commerce and mobile fraud are on the rise, according to RSA, with 41% of successful attacks enabled by phishing scams.

Scam Of The Week: SharePoint Phishing Attack On Office 365 Users

The attack dubbed “PhishPoint” by Cloud Security vendor Avanan demonstrates the craftiness and extent cybercriminals will go to in order to harvest Office 365 credentials.

Is IT Even Trying to Thwart Social Engineering Attacks?

With so much else on their plate, are today’s IT organizations doing enough to protect the organization against social engineering and phishing attacks?

Social Media Facial Recognition Could Make the Bad Guys Worse

Trustwave shows how the latest advancements in technology could be used to aid cybercriminal activity.

Why Doesn’t Cyber Insurance Have Phishing Prevention Discounts?

Whether online-related or not, insurance is insurance. So, shouldn’t there be discounts for organizations who demonstrate cyber-responsibility?

OK, Guys, this one is for you. Yes, you. The guy who keeps friending strange women on Facebook

This was sent to me by a friend that I know is legit. It's a fun read and has some good tips on how to stay safe using social media.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.