Security Awareness Training Blog

Phishing Blog

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

The Famous Fall Victim To Phishing, Too

A Georgia resident has taken a guilty plea to charges of hacking numerous Apple accounts belonging to high-profile athletes and musicians and stealing their credit card information, ...
Continue Reading

ISACA Recommends Phishing Simulations and Measurement as Appropriate Defense to Reduce Risk of Successful Phishing Attacks

Organizations are working to limit the effectiveness of phishing attacks using both internal and external collateral and programs. According to ISACA, the important thing is to have ...
Continue Reading

Mobile Devices Rise as a Top Attack Vector for Cybercriminals; Malware and Phishing Remain Primary Concerns

Cybercriminals are using every means available to reach their victims. According to Verizon’s latest data, attacks on mobile devices are increasing while security efforts fall behind.
Continue Reading

90% of large tech companies vulnerable to email spoofing

Most companies have not implemented standards for authenticating emails and preventing hackers from successful phishing attacks, according to Valimail.
Continue Reading

Which Employees are the Cyber Criminals After?

Lower-level employees are the workers most likely to face highly-targeted attacks, according to the online marketing firm Reboot. Citing information from Proofpoint’s most recent ...
Continue Reading

Microsoft Takes Control Of 99 Phishing Domains Operated By Iranian State Hackers

The domains had been used as part of spear-phishing campaigns aimed at users in the US and across the world. Court documents unsealed today revealed that Microsoft has been waging a ...
Continue Reading

Cybercriminals Double-Down on What Works, Nearly Doubling the Number of Phishing Attacks in 2018

Using a combination of old and new tactics and distribution channels, cybercriminals continue to seek to compromise endpoints and obtain online credentials. The targets haven’t changed. ...
Continue Reading

Find out which of your users' emails are exposed before the bad guys do

Do you know how big your email attack surface really is? Open Source Intelligence (OSINT) is the collection of information from public sources on the Internet that both red teams and bad ...
Continue Reading

Phishing Attack Compromises Spanish Defense Intranet By Foreign State

Reuters reported that a "computer virus" infected the Spanish Defense Ministry’s intranet this month with the aim of stealing high tech military secrets, El País newspaper said on ...
Continue Reading

U.S. Healthcare Employee Engagement with Simulated Phishing Emails Drop by 67% With Repeated Exposure

A long-term phishing study involving 6 healthcare institutions shows employees are vulnerable to phishing attacks, and that they can become more vigilant through exposure.
Continue Reading

[Heads-up] This Evil New Child Porn Phishing Attack Could Absolutely Ruin Your Life

Oh my. Bad guys have come up with a sinister new strain of blackmail/sextortion. Just when you thought things couldn't get worse, the bad guys sink lower. Eric Howes, KnowBe4's Principal ...
Continue Reading

WOW, Phishing Attacks Are Now More Common Than Malware!

Microsoft’s security team is uniquely positioned to analyze trends in cyber security threats. Their frequent Security Intelligence Reports (SIR) are an excellent indicator of these ...
Continue Reading

[Heads-up] Cybercriminals Are Moving To Mobile Phishing for Gift Cards Scams

Scammers are shifting to SMS to carry out business email compromise (BEC) attacks, since text messaging offers less visibility to the victim and more flexibility to the attacker, says ...
Continue Reading

Phishing campaign targets Instagram users with fake copyright notices

A new phishing campaign targeting Instagram users is using fake copyright infringement notices to steal user credentials.
Continue Reading

Blackmail and Sextortion Attacks Use Panic and Threats to Lure Their Victims

Preying on a victim’s fear of having “private” browsing details leaked sits at the center of these well-crafted attacks that leverage stolen or harvested passwords to establish ...
Continue Reading

Very Few Professionals are Confident in Their Phishing Defense Assessments

New research from ISACA and Terranova Security found that just 12% of security, assurance, risk and governance professionals are confident in their ability to assess the effectiveness of ...
Continue Reading

One in Seven Healthcare Employees Will Fall for Phishing Emails

A study recently published in the Journal of the American Medical Association highlights how vulnerable the healthcare sector is to phishing attacks, according to Jessica Davis at Health ...
Continue Reading

The Phishing Bait is Bitcoin; the Hook is a Clipboard Hijacker

A new phishing campaign is spreading malware through emails that claim to have Bitcoin investment updates, according to My Online Security. The emails direct the victim to download an ...
Continue Reading

[SCAM OF THE WEEK] Phishing Attack Warns About Boeing 737 Max Crashes And Infects Workstations

Large airline crashes tend to uniquely focus almost everyone's attention. Lowlife internet criminals are exploiting the fear connected to these incidents, and leverage it in phishing ...
Continue Reading

[SCAM OF THE WEEK] New "Final Warning" Sextortion Emails State Adult Sites Infected You

Bleepingcomputer reported this week: "A new sextortion email campaign is underway that states a hacker infected the recipient's computer while they were visiting an adult web site. The ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews