Human Risk Management Blog

Phishing

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Kate Spade Suicide Phishing Templates

This is another celebrity death which will spawn a raft of phishing and social media attacks. We recommend to inoculate your users before they make it through the filters.

Watch Out For World Cup Soccer Phishing Scams

The 2018 FIFA World Cup has drawn a worldwide audience. It's also attracted phishing scams using event tickets as bait. Tickets for the matches can only be purchased legitimately through ...

Punycode Makes SMiShing Attacks More Deceiving

Phishing attacks carried out via text messages that use the “Punycode” technique to make nefarious URLs look legitimate are becoming more popular, cloud security firm Zscaler says.

Cobalt Cybercrime Group Resumes Phishing Attacks

The leader of the Cobalt hacking group was arrested in Spain two months ago, but the gang resurfaced at the end of May. Their spear phishing emails started hitting victims' in-boxes again ...

Why is Windows 10 Rapidly Gaining Ground in The Enterprise While Win7 Gets Ditched?

Duo Security is a provider of secure login/access tools, and they just released their yearly Trusted Access Report with some very interesting data. Here Is The Summary Stats gathered from ...

It's May 25th, 2018: GDPR DAY! Here Are Phishing Templates You Can Use...

Because it is "GDPR day" our templates team has been hard at work developing GDPR/Privacy policy templates. We have 6 new templates available in the system, located in Current Events. We ...

Which Users Will Cause The Most Damage To Your Network And Are An Active Liability?

The statistic that four percent of employees will click on almost anything, with “Free Coffee” and “Package Delivery” taking some of the top spots among phishbait subject lines, may not ...

A Banking Trojan Goes Phishing

Roaming Mantis has drawn notoriety as a banking Trojan. Its criminal controllers, however, have recently given it some new functionality: phishing and cryptomining. The criminals have ...

Scam Of The Week: GDPR Phishing Attack With Apple Flavor / Royal Wedding

Social engineering follows seasonal patterns. It's also connected to major events. We see this every year with holiday-themed phishing attacks between Thanksgiving and New Year's Day.

Phishing and pretexting represent 93% of social attack-based breaches

A good article in Forbes that takes another dive into the new 2018 Verizon Data Breach Investigations Report.

[Heads-up] New Attack Blindsides Microsoft Office 365 Anti-Phishing Filter And Blacklists

Phishers have found a way of moving the malicious URLs in their emails past Office 365's protections. The security company Avanan says they've observed criminals using a tag in the HTML ...

Police Dept Loses 10 Months of Work to Ransomware. Gets Infected a Second Time!

Bleepingcomputer reported: "Ransomware has infected the servers of the Riverside Fire and Police department for the second time in a month. The first ransomware infection took place on ...

Does Gmail's New 'Confidential Mode' Make Phishing Easier?

Gmail's new confidential mode lets its users create "expiration dates" for emails, or require recipients to provide an SMS passcode. (And Google also claims they've removed the option to ...

HMRC warns of new wave of UK phishing scams

Rosie Murray West at the Financial Times reported: "Taxpayers are being targeted by a new wave of phishing scams linked to the financial calendar, HM Revenue & Customs has warned. ...

The history and derivation of the word phishing...

The word "phishing" can't be found in Chaucer or Shakespeare. It is a homophone of "fishing". But why "ph" instead of "f"? Many English words of Greek origin transliterate "φ" (phi) as ...

[Heads-up] New Exploit Hacks LinkedIn 2-factor Auth. See This Kevin Mitnick VIDEO

OK, here is something really scary. KnowBe4's Chief Hacking Officer Kevin Mitnick now and then calls me with some chilling news. This time, Kuba Gretzky, a white hat hacker friend of ...

Scam Of The Week: Phishing Attack Uses GDPR As Bait

Attackers know that companies are sending a lot of emails to customers about GDPR—and that makes them prime opportunity for phishing attacks. With the looming GDPR May 25 deadline almost ...

Q1 2018 Top Clicked Phishing Email Subjects [INFOGRAPHIC]

This is the second year we've published quarterly results of the most-clicked phishing email subjects across a few categories. We separate the data into subjects related to social media ...

Chinese Cyber Spies Focus On Spear Phishing... YOU!

Catalin Cimpanu at Bleepingcomputer reported: "Chinese cyber spies are evolving their tactics, focusing on IT staffers, relying more and more on spear phishing instead of malware, and ...

Cylance: "Phishing and drive-by downloads lead infection methods."

The most common infection vectors are still email phishing and drive-by downloads according to the latest threat report from AI security specialist Cylance. The report provides a ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.