Security Awareness Training Blog

Security Awareness Training Blog

Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.

[Heads Up!] A Whopping 21 Percent of Phishing Attack URLs Are Not Detected As Malicious For Days After They Go Live

New data from Akamai provides insight into why phishing attacks are making it all the way to the endpoint… and why they can trick users so easily into becoming a victim.
Continue Reading

Secret Service Warning: Exploiting the Coronavirus for Fraud and Profit.

By Eric Howes, KnowBe4 Principal Lab Researcher. On Monday of this week we published a review of the coronavirus-themed emails that had been reported to us by customers using the Phish ...
Continue Reading

A Look at Email Security in the US Healthcare Sector

90% of US healthcare organizations experienced email-based attacks in the past year, and 25% of these organizations said the attacks were extremely or very disruptive, according to a new ...
Continue Reading

Cyberattacks on MSPs Grow Exponentially as the Focus Shifts to Hold Their Customer’s Data for Ransom

Recent insight from data protection vendor Datto puts MSPs on notices to secure their own environments to protect both their business and that of their customers.
Continue Reading

Cruel Hoax Scams Elderly Woman

An 89-year-old woman in Delaware lost $9,500 to scammers who told her that her grandson had been arrested for causing a car accident, Delaware Online reports. The scammers called the ...
Continue Reading

Exploiting the Coronavirus: The Spammers, the Scammers, and the Bad Guys

By Eric Howes, KnowBe4 Principal Lab Researcher. If you've been paying attention to the news over the past week or so, you've undoubtedly noticed that the majority of the stories on your ...
Continue Reading

Use Advocates to Spread Your Security Awareness Training Program

I’ve always been a big fan of train-the-trainer programs. Even if you are a great computer security consultant and trainer, there is a limit to what you, one person or one team, can do. ...
Continue Reading

February Content Update: Including Season 2 of Netflix-Style Series 'The Inside Man'

Here are a few important updates to share with you from the month of February.
Continue Reading

New Norton LifeLock Phishing Scam Installs Remote Access Trojan

In yet another case of brand impersonation, this new phishing scam seeks out the millions of LifeLock customers and follows a seasoned infection path, with the goal being persistence and ...
Continue Reading

Yet Another Utility Company Falls Victim to Ransomware Attack

The latest ransomware attack on yet another utility company echos the warnings from last year’s report on utilities’ readiness for a cyberattack.
Continue Reading

Anti-Virus, Identity Protection Phishbait

A phishing campaign is using fake NortonLifelock documents to trick victims into installing a remote access tool, according to researchers at Palo Alto Networks’ Unit 42. The documents ...
Continue Reading

KnowBe4 and Agari Announce New Partnership to Transform Phishing Protection

As market leaders, KnowBe4 and Agari have joined forces to help stop identity-based email attacks. Together, we have created a best-in-class approach to defend against phishing attacks at ...
Continue Reading

New Sophisticated Credential-Stealing Malware, Forelord, Attacks the Middle East

This latest APT highlights the levels of sophistication attackers will go to just to establish persistence, infect the endpoint, and steal credentials from the victim organization.
Continue Reading

Courts Limit Payout on Insurance Claim to Just One Section of the Liability Policy

The latest ruling shows how the courts are becoming well-versed in the ways of cyberattacks, and are holding both insurers and policyholders to the letter of the contract.
Continue Reading

Social Security Administration Warns of Phone Scams On March 5th "Slam The Scam Day"

The Social Security Administration in Association with the Federal Trade Commission's (FTC) National Consumer Protection Week, want to remind everyone that scammers are now targeting ...
Continue Reading

[On-Demand] Never Assume Breach: Build a Data-Driven Defense Strategy to Secure Your Organization's Most Valuable Assets

Even the world’s most successful organizations have significant weaknesses in their IT security defenses, which today’s determined hackers can exploit at will. There’s even a term for it: ...
Continue Reading

Cut-and-Paste Phishbait

Naked Security describes a phishing campaign that’s convincingly spoofing emails from the online payment company Stripe. The email informs the recipient that an unknown device has logged ...
Continue Reading

Data Breach After Effects: Consequences and Learning Lessons

If you think your organization is safe from a data breach, think again. Data breaches could be deadly for any organization big or small.
Continue Reading

New Sophisticated “Exaggerated Lion” BEC Check Scam Uses Mules to Cash Out

You may wonder exactly how BEC scammers see a payday. New insight from security vendor Agari documents how a secondary check scam dupes unsuspecting victims to help.
Continue Reading

Racoon: Infostealer Malware Collects Credentials, Financial and Personal Information

Access to a compromised endpoint may no longer be enough. So, enterprising malware authors offer up infostealers to help exfiltrate valuable data from an infected machine.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews