Half of all Breaches Start with Phishing and Social Engineering
New data shows successful attacks on internal networks, cloud environments, and POS systems all are very susceptible to this common attack vector.
Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.
New data shows successful attacks on internal networks, cloud environments, and POS systems all are very susceptible to this common attack vector.
Scammers use realistic-looking emails and a well-designed website under the guise of the Paycheck Protection Program to trick victims into providing banking credentials.
It’s no surprise that phishers and scammers are using the avalanche of new information and events involving the global coronavirus pandemic as a way to successfully phish more victims. ...
That means you can from now on count a ransomware infection as a data breach with all the consequences that this brings. Moreover, the so-called "human-operated" ransomware gangs have ...
I had some numbers run on the usage of our new, dedicated COVID-19 phishing templates to find out what the Phish-prone percentage was, since this is an unprecedented worldwide event. ...
A phishing campaign is impersonating the US Small Business Administration (SBA) in an attempt to deliver the Remcos remote access Trojan, according to researchers at IBM X-Force. The ...
Every good defense has three pillars of controls: policy, technical, and education. People are always asking what they should do for each to minimize cybersecurity events the most and ...
The price of phishing kits on the black market rose by 149% in 2019, according to researchers at Group-IB. ZDNet reports that the researchers tracked the pricing of 16,200 phishing kits ...
10% of all brand-impersonation phishing attacks spoofed Apple in the first quarter of 2020, according to a new report from Check Point. Netflix came in second with 9%, followed by Yahoo ...
The 5-year old malware variant has reared its ugly head once again after a three-year hiatus – this time attempting to take advantage of the need for COVID-19 financial assistance.
With people sheltering in place during the pandemic emergency, they’re both teleworking and finding their entertainment online. Google searches for Netflix jumped 142% since the advice to ...
On April 20, we celebrate National Look-Alike Day. It’s the perfect time to see which people have similar features as you, instead of that completely normal person you bumped into at the ...
Dutch banks saw damage from phishing double last year compared to the previous year. This concerns both phishing for 2FA security codes and phishing for credit and debit card numbers, ...
By Eric Howes, KnowBe4 Principal Lab Researcher. If you've been following the news over the past week or so then you know that a robust debate has opened at federal, state, and local ...
We are excited to announce the availability of PhishRIP™ as part of the PhishER platform to all PhishER customers. PhishRIP is a new email quarantine feature that integrates with ...
A new report from CyberCube found that sophisticated cybercriminals are increasingly shifting to launching business email compromise (BEC) attacks against executives, Insurance Business ...
At a time when hospitals are already stretched thin for budget, one of many attackers still thinks it’s a good idea to hold hospitals for ransom, showing organizations always need to be ...
Attackers are taking advantage of the pandemic, looking for every way possible to achieve their malicious goals via targeted phishing campaigns of every kind.
Everyone is vulnerable to social engineering and no security tool can block every phishing email, according to Kevin Casey at The Enterprisers Project. Casey talked to a number of ...
By Katie Brennan, KnowBe4 Product Content Director. The COVID-19 pandemic has had cyber criminals in a phishing frenzy for months. They’ve been sending countless attacks, with the ...