Human Risk Management Blog

Phishing

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

All Con, All the Way Down: Bad Guys Spoof Phishing Link Hover Texts

At the heart of almost every phishing email is a spoof. In malicious emails spoofing is the art of deceptively imitating something or someone trusted by users in order to gain their ...

[HEADS UP] Cybercriminal Sells Info on 186 Million U.S. Voters

In a recent report by NBC News, cybersecurity company TrustWave found a bad guy selling voter registration data on 186 million Americans.

The Ultimate Cyber Security Tip

It’s Cyber Security Awareness Month, and the security advice is flowing out from all corners of the web to advise your users on remaining secure. However, all this information can be ...

[HEADS UP] Australia Warns Citizens of JobKeeper Phishing Email

The Australian Taxation Office has advised Australians to delete a particular email and to not provide any personal information.

Middle Management is the Next Target for Phishing Attacks

Mid-level managers need to be particularly wary of targeted phishing attacks, according to Jenn Gast at INKY. Gast explains that criminals can easily conduct open-source research on a ...

[On-Demand] Lessons Learned: An IT Pro’s Experience Building his Last Line of Defense

This is the true story of an IT Manager who was tired of his users clicking everything and wanted to teach them a lesson… in a good way.

Notes on Social Engineering, and What to Do About It

Phishing attacks are growing in prevalence during the pandemic, according to David Dufour, Vice President of Engineering and Cybersecurity at Webroot. Webroot’s recent threat report ...

Threat Actors Take Advantage of Exchange Online and Outlook on the Web with New Levels of Sophistication

New insight from Accenture Security highlights specific ways attackers are changing their tactics to make Microsoft’s email platform a tool rather than an obstacle for phishing attacks.

The Risk of Redirector Domains in Phishing Attacks

Researchers at GreatHorn warn that a large-scale phishing campaign is using open redirects to evade email security filters. Open redirects allow attackers to take a URL from a ...

The Secret to This Email Phishing Campaign is Volume

FireEye says a newly characterized cybercriminal gang, FIN11, has been launching widespread email phishing campaigns for the past four years. The group isn’t particularly sophisticated, ...

Q3 2020 Top-Clicked Phishing Subjects: Coronavirus-Related Attacks Still Prevalent [INFOGRAPHIC]

KnowBe4's latest quarterly report on top-clicked phishing email subjects is here. These are broken down into three different categories: social media related subjects, general subjects, ...

Fake Social Media Verification Scams Are the Gateway to Something Much More Sinister

Using copyright violation threats or the lure of obtaining a blue checkmark to verify your account, the latest scams easily trick victims out of their social media credentials.

FINRA Yet Again Becomes the Impersonated Brand at the Center of Phishing Attacks on Brokerage Firms

A mix of domain, phishing emails, a dash of social engineering, and a survey are the recipe for a simple and yet effective campaign targeting the financial sector.

Trends in Malicious Attachments Used in Phishing Emails

People need to be familiar with the types of malicious attachments used in phishing emails, according to Lawrence Abrams at BleepingComputer. One of the most common methods of installing ...

[eSummit] Your Cybersecurity Awareness Month Action Plan

Cyber threat actors are getting more creative and more skilled at hacking the human. That's why we've created this cybersecurity eSummit to look at evolving attack techniques your end ...

Sophisticated Mercenary Group Excels at Social Engineering

An extremely skilled group of hackers-for-hire dubbed “Bahamut” is using sophisticated social engineering tactics against a range of targets around the world, researchers at BlackBerry ...

The Market for Phishing Kits

Inexperienced cybercriminals can easily find places to buy phishing kits in the open, on the “surface web” (as opposed to the deep or dark web), according to Jan Kopriva at the SANS ...

Scam Of The Week: Bad Guys Prep For Prime Day Phishing Attacks

Amazon, the world’s largest online retailer, hosts a massive sales event once a year called Prime Day. Usually set in July, the highly awaited two-day event was postponed until October ...

[HEADS UP] Local Boston Town Falls Victim to a Phishing Attack

According to a local news source from Boston, the Town of Franklin recently became the next victim to a phishing attack, costing over $500K.

61% of Successful Phishing Attacks Against Government Organizations Result in Full Compromise of Credentials

Phishing remains the top primary attack vector that keeps on giving to cybercriminals, as new data highlights the victories cybercriminals are enjoying at your organization’s expense.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.