Human Risk Management Blog

Phishing

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Scam Of The Week: The Most Sophisticated Netflix Phishing Yet

This Netflix phishing campaign goes after your login, credit card, mugshot and ID! Paul Ducklin at Sophos wrote: "Think of the big security stories of recent months. Security holes like ...

KnowBe4 2017 Top Clicked Phishing Test Analysis

Click on the Picture to download the full infographic in PDF format Looking at the whole of 2017, there were some interesting shifts on what phishing emails were clicked from quarter to ...

Forget Viruses or Ransomware—Is Your Biggest Cyberthreat Greedy Cryptocurrency Miners?

This week, cybersecurity firm Check Point published its regular Global Threat Index. Malware that hijacks workstations to mine cryptocoins has apparently become the most popular infection ...

Business Email Compromise Phishing Attacks Will Exceed $9 Billion This Year

Trend Micro reported that Business Email Compromise (BEC) is projected to skyrocket as attackers use more and more sophisticated social engineering tactics to trick their targets. The ...

Three-Quarters of Businesses Saw Phishing Attacks in 2017

Tara Seals at InfoSecurity Magazine had a good summary of Wombat Security Technologies' annual State of the Phish research report. "The war against phishing is still on, with 76% of ...

Google’s Confusing Gmail Security Alert Looks Exactly Like a Phishing Attempt

Note: I got this too and had a similar reaction last week. Security researchers say the legitimate email is training people to have bad email hygiene. Richard De Vere, a security ...

Spend One Minute And Look At These Phishing Graphs

In the first quarter of 2018, after 7 years of helping our customers to enable their employees to make smarter security decisions and having reached the milestone of 15,000 customers, we ...

[On-Demand Webinar] Phishing Attack Landscape and Benchmarking

The most persistent security challenge you face today is bad guys social engineering your users. Phishing campaigns continue to be hacker’s No.1 preferred attack vector to get your ...

SNAFU Some AV Tools Cause BSODs And Boot Failures After Meltdown Patches

Microsoft's patch to protect Windows computers from the Meltdown / Spectre "hardware bug" revealed the rootkit-like nature of many antivirus tools. Some AV products are incompatible with ...

One surprising statistic explains why phishing will remain the most common cyberattack for the next few years

Phishing will remain the primary email attack vector through 2020. A new report from Comodo Security Threat Lab's VP, Fatih Orhan, brings up an interesting statistic from Friedrich ...

Report: Most Government Agencies Vulnerable To Phishing

Nearly half of federal agency email domains have adopted policies to collect data on unauthorized emails, a move mandated by the Department of Homeland Security in October, according to a ...

Nearly 250,000 user logins are being hacked every week and become phishing targets

A research team from Google collaborated with the cybersecurity experts from the University of California, Berkeley to scrutinize the activities of these online miscreants. After about 1 ...

Roll back time when users click on a bad link with our new free tool, Second Chance!

Wouldn't it be great if your users had a way to "roll back time" when they forgot to think before they click on a bad link? Now they can! We are excited to announce Second Chance, a ...

86% of security pros worry about a phishing future where criminals are using Artificial Intelligence

A new survey by Webroot shows that 86% of security professionals worry that AI and ML (machine learning) technology could be used against them. And they are right, because it will and ...

W-2 Phishing Scams Likely to Resurface After the New Year

W-2 phishing season is just a few weeks away. For the past several tax seasons, cyber criminals have used sophisticated social engineering tactics to dupe hundreds of payroll and HR ...

Trojan Phishing Attacks By North Korean Hackers Are Attempting To Steal Bitcoin

Researchers at Secureworks report Trojan malware is being distributed in phishing emails using the lure of a fake job ad. A prolific cyber criminal gang with links to North Korea is ...

Basic training in avoiding phishing is no longer sufficient

Databreaches.net has forums and one of their posts really got our attention. It was an official notification from the legal department of Boise Cascade Company in Utah about a phishing ...

Phishing Schemes Are Using Encrypted Sites To Seem Legit

WIRED wrote: "A MASSIVE EFFORT to encrypt web traffic over the last few years has made green padlocks and "https" addresses increasingly common; more than half the web now uses internet ...

Mailsploit Bypasses DMARC And Lets Attackers Send Spoofed Phishing Emails on Over 33 Email Clients

Our friends at Bleepingcomputer reported on something that should cause anyone concern. German security researcher Sabri Haddouche has discovered a set of vulnerabilities that he ...

Scam Of The Week: Phishers Target PayPal Users With Fake “Failed Transaction” Emails

Scammers are pushing out fake PayPal emails that use the premise of an unverified transaction to phish for customers’ personal and financial information. With the end-of-the-year holidays ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.