Human Risk Management Blog

Phishing

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

[InfoGraphic] 20 Ways to Block Mobile Attacks

To start your National Cyber Security Awareness Month (NCSAM) here is a goodie for your users to kick things off.

Targeted Attacks Replace Spam Campaigns

Spam campaigns are all but dead. But lucrative targeted low-risk, high-yield cyber-attacks have risen to take their place, according to the European Union law enforcement agency Europol.

Brand-New Tool: Domain Doppelgänger Identifies Evil Twin Domains

I gave you a heads-up a few days ago, and now I'm excited to announce the actual release of a new tool to help protect your organization from cybercriminals.

Ewww. Password managers can be tricked into believing that malicious Android apps are legitimate

Ewww. Something else to watch out for. Will it ever stop?. Ummm, no.

Highly Targeted Email Attacks Are on the Rise!

New data shows a surge in attacks, what industries are targets, which users are at risk, and what you can expect to see in the future.

As Predicted, Hurricane Florence Phishing Scams are Circulating

We’ve noted in other posts that events like natural disasters are inevitably used as phishbait by scammers. The Atlantic hurricane season, which breeds storms like the recent and very ...

I Got Vished (and So Can Your Users)

Written by Guest Blogger Nick Cavalancia, Microsoft MVP Hear one cybersecurity expert’s experience of missing the signs and getting duped over the phone. If it can happen to him, it can ...

Phishing Attack On Office 365 Account Leads To 3 Million CEO Fraud

A phishing attack on an Office 365-account enabled a 3 Mil CEO Fraud Scam at an investment firm. Finnish antivirus company F-Secure reported on their blog. One of the employees at the ...

It Only Takes One Phish to Spoil Your IPO

The recent data breach of pre-IPO biotech firm Guardant Health shows how much impact a single successful phishing attack can have on an organization.

The Evolution Of "Friendly Name" Spoofing During Phishing Attacks

Our friends at Bleepingcomputer had a great article written by Ionut Ilascu I think you will like: "While phishing continues to be the prevalent threat in malware-less email-based ...

WATCH IT - Current Events Will Be Misused for Phishing...AGAIN

Here are the latest Current Events phishes from the KnowBe4 team over the past few days, some prompted by warnings from US-CERT.

Colleges Become Phishing Targets with Student Loans as the Payoff

Anytime there’s a transaction involving money, cybercriminals look for ways to hack in and intercept funds. Student Loans are the latest target.

Phishing from Beyond the Grave...

By Eric Howes, KnowBe4 Principal Lab Researcher. It's no secret that the threat of phishing emails has been growing at an alarming rate for a number of years. Indeed, ZDNet recently ...

Details of North Korea Attacks Highlight Email’s Role in Attacks

When you think of cyber-espionage, you might be surprised it’s far less “Mission: Impossible” and a lot more basic phishing tactics.

Phishing Scammers are Planning Well into 2020

Cybercriminals are already looking to take advantage of the 2020 Tokyo Olympics. Are you thinking years out? The bad guys are.

New York State Universities Targeted by Phishing Scams

Students from Plattsburgh State and SUNY Adirondack were targeted by several types of scams over the summer, causing Plattsburgh State officials to send out warnings to the student body. ...

Phishing warning: One in every one hundred emails is now a hacking attempt

And just one mistake can compromise an entire organisation. Danny Palmer at ZDNet wrote: "One in every one hundred emails sent round the globe has malicious intent, likely to deliver ...

"Voice Phishing" in Korea This Year Already Exceeds 2017 Numbers.

The Korea JoonGang Daily reported that despite warnings from financial authorities, an average of 116 people fall victim to what is called "voice phishing" scams every day in Korea.

Weaponized IQY Files Make Excel Users an Easy Target

The Necurs botnet – most notably responsible for distributing Locky – is now pushing weaponized internet or web query (.IQY) file to evade detection and download malware.

Only 40% of Business Phishing Scams Contain Links

This latest statistic takes the spotlight off of antivirus as the protector, and puts the focus squarely in the hands of your users to stop attacks.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.