Security Awareness Training Blog

Phishing Blog

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Eastern European Hackers Hit Target Phish Out 40M Credit Cards

During the Black Friday shopping week, tens of millions of credit and debit card records were "phished" out of Target. The data breach was nationwide, and has extended for as far as ...
Continue Reading

Interesting info on phishing and social engineering on 60 minutes

Last weekend, 60-minutes had a special about the NSA which spoke out on Snowden and spying. The headline was: "The NSA gives unprecedented access to the agency's HQ and, for the first ...
Continue Reading

10 Social Engineering Predictions for 2014

Here are 10 predictions for 2014, all cyber attacks using social engineering to penetrate the network. Have fun reading, and I will try to report back in 12 months which ones came out as ...
Continue Reading

Ponemon: Phishing part of 50% of APT's

Continue Reading

The Antivirus Industry’s Dirty Little Secret

[Updated 5/1/2016]. The Antivirus industry has a dirty little secret that they really don’t want anyone to know. Despite the claims of their marketing departments, their products are not ...
Continue Reading

A Serious Legal Liability: Bad or No Security Awareness Training

Please read this article and then forward it to the head of your legal department or the person in your organization who is responsible for compliance. Recently, the Department of Health ...
Continue Reading

Is Your Security Awareness Training Program Broken?

Steve Ragan over at CSO Magazine wrote:
Continue Reading

Scam Of The Week: "U.S. Starts Bombing Syria"

This one is crafty. There is a fake CNN spam being sent with a subject that reads: "The United States began bombing!" in Syria, but clicking on it will likely result in the workstation ...
Continue Reading

Electronic ID cards join fight against phishing attacks

Phishing attacks are believed to have hit 37.3 million people last year, escalating online password theft 300%. To fight back against this type of cyberattack, a team of researchers at ...
Continue Reading

Cyber risk weighs heavy on minds of execs

Tony Bradley at CSO Mag has a good analysis: " There is good news and bad new stemming from the Lloyd’s of London Risk Index 2013 report. The good news is that cyber risk is gaining more ...
Continue Reading

Are Your Email Addresses On A Russian Phishing Site?

We are finding many U.S. commercial email addresses at the Russianemailsworld.boommer.ru website. It is really a 'staging' area for emails to be posted by the criminal underground. They ...
Continue Reading

Scam Of The Week: Christian Singles

Continue Reading

Employees the Weakest Link of Cyber Security, Report Finds

Antivirus company Bitdefender reported something important. Here is their blog post of July 17, 2003.
Continue Reading

Congressional Aides Targeted By Spear-phishing Attacks

Reuters just reported that Congressional aides in the Senate and House of Representatives said on Thursday that they were notified of a potential security risk involving email and other ...
Continue Reading

Phishing Attack: Your Twitter friend may not really be your friend

There is a new phishing campaign doing the rounds trying to get your Twitter login credentials. The scam arrives as a direct messages to prospective victims from one of their contacts. ...
Continue Reading

7 reasons for security awareness failure

Ira Winkler and Samantha Manke just wrote a great article at the CSO site about why security awareness programs fail. They started out with: "There is a great dichotomy in Security ...
Continue Reading

CTO of media company faked-out employees with "phishing" emails

There is a fascinating article in SC Magazine dated July 3, 2013 which tells the story of Atlantic Media Chief Technology Officer Tom Cochran, who blasted out a simulated phishing email ...
Continue Reading

Snowden Exfiltrated NSA Files On Thumb Drive

It appears that Edward Snowden used a thumb drive to exfiltrate the Top Secret files documents from NSA's network. The US DoD banned the use of flash drives in 2008 after Defense systems ...
Continue Reading

New Fun Little Quiz: How Phish-prone Are You?

We created a fun new little quiz you could send to your users!
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews