Human Risk Management Blog

Phishing

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Phishing and pretexting represent 93% of social attack-based breaches

A good article in Forbes that takes another dive into the new 2018 Verizon Data Breach Investigations Report.

[Heads-up] New Attack Blindsides Microsoft Office 365 Anti-Phishing Filter And Blacklists

Phishers have found a way of moving the malicious URLs in their emails past Office 365's protections. The security company Avanan says they've observed criminals using a tag in the HTML ...

Police Dept Loses 10 Months of Work to Ransomware. Gets Infected a Second Time!

Bleepingcomputer reported: "Ransomware has infected the servers of the Riverside Fire and Police department for the second time in a month. The first ransomware infection took place on ...

Does Gmail's New 'Confidential Mode' Make Phishing Easier?

Gmail's new confidential mode lets its users create "expiration dates" for emails, or require recipients to provide an SMS passcode. (And Google also claims they've removed the option to ...

HMRC warns of new wave of UK phishing scams

Rosie Murray West at the Financial Times reported: "Taxpayers are being targeted by a new wave of phishing scams linked to the financial calendar, HM Revenue & Customs has warned. ...

The history and derivation of the word phishing...

The word "phishing" can't be found in Chaucer or Shakespeare. It is a homophone of "fishing". But why "ph" instead of "f"? Many English words of Greek origin transliterate "φ" (phi) as ...

[Heads-up] New Exploit Hacks LinkedIn 2-factor Auth. See This Kevin Mitnick VIDEO

OK, here is something really scary. KnowBe4's Chief Hacking Officer Kevin Mitnick now and then calls me with some chilling news. This time, Kuba Gretzky, a white hat hacker friend of ...

Scam Of The Week: Phishing Attack Uses GDPR As Bait

Attackers know that companies are sending a lot of emails to customers about GDPR—and that makes them prime opportunity for phishing attacks. With the looming GDPR May 25 deadline almost ...

Q1 2018 Top Clicked Phishing Email Subjects [INFOGRAPHIC]

This is the second year we've published quarterly results of the most-clicked phishing email subjects across a few categories. We separate the data into subjects related to social media ...

Chinese Cyber Spies Focus On Spear Phishing... YOU!

Catalin Cimpanu at Bleepingcomputer reported: "Chinese cyber spies are evolving their tactics, focusing on IT staffers, relying more and more on spear phishing instead of malware, and ...

Cylance: "Phishing and drive-by downloads lead infection methods."

The most common infection vectors are still email phishing and drive-by downloads according to the latest threat report from AI security specialist Cylance. The report provides a ...

Gone Phishing: Travelers Claims Plan Doesn’t Cover Cyber Losses

Daniel R. Stoller at Bloomberg Law had an excellent observation about the risks of phishing related to general crime policies. Here is a short excerpt and the whole article is warmly ...

"It can't hurt to open one little attachment, can it?"

Brad Haan sent me this riot cartoon:

PhishLabs Reports That Credential Phishing Has Shifted To The Enterprise

Why is credentials phishing moving from consumers to the enterprise, just like ransomware has done in the last 2 years? The answer might surprise you. Elliot Volkman at the PhishLabs ...

Phishing threats still dwarf vulnerabilities and zero-days

Rob Wright at SearchSecurity wrote: "Proofpoint research shows that while phishing attacks now require victims to take more steps, the success rate for such attacks hasn't declined and ...

Gone Phishing: Employer Faces Liability for Mistakenly Disclosing W-2 Forms to Scammer

Attorneys Zuckerman Spaeder noted on JDSUPRA: "When employers are caught off guard, they can face not only the loss of their own assets, but also liability to their employees. For ...

Scam Of The Week: World's Largest Phishing Botnet Grows Evasive

The notorious Necurs botnet is one of the oldest and largest spam and phishing delivery systems in existence. It controls millions of machines that the criminal botmasters use to send ...

Researchers discover next generation phishing kit

Researchers at Check Point and CyberInt, have discovered a new generation of phishing kit that is readily available on the Dark Web. The new kit, compiled and offered by a criminal whose ...

Mysterious “double kill” Word/IE zero-day allegedly in the wild as phishing attack

“Double kill” is a bragging term from the world of violent video gaming – it means you finished off two assailants with a single shot. In the world of cybercrime, it’s the name given by ...

[NEW WHITEPAPER] 10 Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

Organizations have been victimized by a wide range of threats and exploits, most notably phishing attacks that have penetrated corporate defenses, targeted email attacks launched from ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.