Security Awareness Training Blog

Phishing Blog

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Sextortion Scam Combines Lust and Envy

A sleazy phishing campaign is trying to tempt people into opening an attachment that supposedly contains nude pictures of a friend’s girlfriend, BleepingComputer reports. The attackers ...
Continue Reading

Brand Impersonation Phishing Attacks Grow While Organizations Fail to Protect Their Brand Using DMARC

New data from Security vendor Agari shows how identity deception techniques are being used to fool recipient victims as organizations lack the needed safeguards to ensure emails are ...
Continue Reading

[On-Demand] New 2020 Phishing By Industry Benchmarking Report: How Does Your Organization Measure Up

As a security leader, you have a lot on your plate. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up. IT security seems to ...
Continue Reading

Urgency Around the Coronavirus Leads to Phishing Scams Targeting Healthcare

As if the virus itself wasn’t bad enough, lowlife scammers are using the pandemic to trick healthcare workers into giving up credentials. Elite hackers tried to break into the World ...
Continue Reading

[Heads-Up] Feeding Frenzy: COVID-19 Phishing Attacks Surge as U.S. Reels from Pandemic

By Eric Howes, KnowBe4 Principal Lab Researcher. Having already published three blog pieces on the epidemic of Coronavirus-themed phishing emails and spam/scam offerings online (see HERE, ...
Continue Reading

Organizations Need To Be Wary Of Home Worker Phishing Risks

Security experts warn that phishing attacks against home workers will rise.
Continue Reading

Human Behavior is What Makes Phishing Attacks So Successful

The problem isn’t the lack of software designed to detect, prevent, and protect – it’s that human response is a required part of every phishing attack that users seem to be happy to ...
Continue Reading

Domains Use Homographic Characters to Create Hard to Spot Phishing URL's

Website domains can use homographic characters to create very hard-to-spot phishing URLs, Threatpost reports. Cybersecurity researcher Avi Lumelsky demonstrated how easy it is to create ...
Continue Reading

The Effectiveness of Educating End Users With a Test-Out Quiz

Use a “test-out” quiz as a way to get people who are normally resistant to training to proactively take the training. They think they are taking a quiz to avoid the training, but in ...
Continue Reading

FBI Sends Private Industry Notification Warning of BEC Techniques

The FBI sent out a Private Industry Notification (PIN) warning companies that attackers are abusing Microsoft Office 365 and Google’s G Suite to launch business email compromise (BEC) ...
Continue Reading

Coronavirus-Themed Simulated Phishing Templates

The following templates were added to the console this morning:
Continue Reading

Malicious IQY Files Found in Spam Campaign

Researchers at Lastline have come across a phishing campaign that’s using Internet Query (IQY) files to bypass security filters and deliver a new version of the Paradise ransomware. The ...
Continue Reading

Extreme Measures: The Epidemic of COVID-19 Phishing Emails Rages On

Since the publication of our first two blog pieces documenting the flood of Coronavirus-themed emails (see HERE and HERE), customers using the Phish Alert Button (PAB) have continued to ...
Continue Reading

U.S. Homeland Security: "Malicious Actors Expected To Focus Attacks On Teleworkers. Secure Your VPN"

The Department of Homeland Security's cybersecurity agency this week shared tips on how to properly secure enterprise virtual private networks (VPNs) seeing that a lot of organizations ...
Continue Reading

U.K. Pensions Regulator Sees 145 Percent Increase in Malicious Email Activity

The U.K. Government’s massive jump in email-based cyberattacks far outpaces even the most aggressive phishing or spam growth numbers seen this year.
Continue Reading

[Heads Up!] A Whopping 21 Percent of Phishing Attack URLs Are Not Detected As Malicious For Days After They Go Live

New data from Akamai provides insight into why phishing attacks are making it all the way to the endpoint… and why they can trick users so easily into becoming a victim.
Continue Reading

Secret Service Warning: Exploiting the Coronavirus for Fraud and Profit.

By Eric Howes, KnowBe4 Principal Lab Researcher. On Monday of this week we published a review of the coronavirus-themed emails that had been reported to us by customers using the Phish ...
Continue Reading

A Look at Email Security in the US Healthcare Sector

90% of US healthcare organizations experienced email-based attacks in the past year, and 25% of these organizations said the attacks were extremely or very disruptive, according to a new ...
Continue Reading

Cyberattacks on MSPs Grow Exponentially as the Focus Shifts to Hold Their Customer’s Data for Ransom

Recent insight from data protection vendor Datto puts MSPs on notices to secure their own environments to protect both their business and that of their customers.
Continue Reading

Exploiting the Coronavirus: The Spammers, the Scammers, and the Bad Guys

By Eric Howes, KnowBe4 Principal Lab Researcher. If you've been paying attention to the news over the past week or so, you've undoubtedly noticed that the majority of the stories on your ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews