KnowBe4 2017 Top Clicked Phishing Test Analysis
Click on the Picture to download the full infographic in PDF format Looking at the whole of 2017, there were some interesting shifts on what phishing emails were clicked from quarter to ...
Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.
Click on the Picture to download the full infographic in PDF format Looking at the whole of 2017, there were some interesting shifts on what phishing emails were clicked from quarter to ...
This week, cybersecurity firm Check Point published its regular Global Threat Index. Malware that hijacks workstations to mine cryptocoins has apparently become the most popular infection ...
Trend Micro reported that Business Email Compromise (BEC) is projected to skyrocket as attackers use more and more sophisticated social engineering tactics to trick their targets. The ...
Tara Seals at InfoSecurity Magazine had a good summary of Wombat Security Technologies' annual State of the Phish research report. "The war against phishing is still on, with 76% of ...
Note: I got this too and had a similar reaction last week. Security researchers say the legitimate email is training people to have bad email hygiene. Richard De Vere, a security ...
The most persistent security challenge you face today is bad guys social engineering your users. Phishing campaigns continue to be hacker’s No.1 preferred attack vector to get your ...
Microsoft's patch to protect Windows computers from the Meltdown / Spectre "hardware bug" revealed the rootkit-like nature of many antivirus tools. Some AV products are incompatible with ...
Phishing will remain the primary email attack vector through 2020. A new report from Comodo Security Threat Lab's VP, Fatih Orhan, brings up an interesting statistic from Friedrich ...
Nearly half of federal agency email domains have adopted policies to collect data on unauthorized emails, a move mandated by the Department of Homeland Security in October, according to a ...
A research team from Google collaborated with the cybersecurity experts from the University of California, Berkeley to scrutinize the activities of these online miscreants. After about 1 ...
Wouldn't it be great if your users had a way to "roll back time" when they forgot to think before they click on a bad link? Now they can! We are excited to announce Second Chance, a ...
A new survey by Webroot shows that 86% of security professionals worry that AI and ML (machine learning) technology could be used against them. And they are right, because it will and ...
W-2 phishing season is just a few weeks away. For the past several tax seasons, cyber criminals have used sophisticated social engineering tactics to dupe hundreds of payroll and HR ...
Researchers at Secureworks report Trojan malware is being distributed in phishing emails using the lure of a fake job ad. A prolific cyber criminal gang with links to North Korea is ...
Databreaches.net has forums and one of their posts really got our attention. It was an official notification from the legal department of Boise Cascade Company in Utah about a phishing ...
WIRED wrote: "A MASSIVE EFFORT to encrypt web traffic over the last few years has made green padlocks and "https" addresses increasingly common; more than half the web now uses internet ...
Our friends at Bleepingcomputer reported on something that should cause anyone concern. German security researcher Sabri Haddouche has discovered a set of vulnerabilities that he ...
Scammers are pushing out fake PayPal emails that use the premise of an unverified transaction to phish for customers’ personal and financial information. With the end-of-the-year holidays ...
The NTT Security Global Threat Intelligence Center (GTIC) 2017 Q3 Threat Intelligence Report provides a glimpse inside the research conducted by NTT Security researchers over the last ...
The Kazakhstan-born Canadian citizen Karim Baratov (22) has pleaded guilty to massive 2014 Yahoo hack that affected three billion accounts. He admitted that he generally spearphished his ...