Human Risk Management Blog

Security Awareness Training

Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.

Sextortion Email Scams Now Include Threats to Infect Victims with COVID-19

In what may be either a moment of brilliance or desperation, scammers are attempting to use coronavirus infection threats as a means of further convincing victims to pay up.

New Potential Phishing Scam Begins with A Phone Call

A recent suspicious phone call was brought to our attention. It looks to be the beginning of a phishing campaign and demonstrates the lengths cybercriminals will go to in order to ensure ...

The Dilemma: Should you phish test during the COVID-19 pandemic?

By Perry Carpenter, KnowBe4 Chief Evangelist and Strategy Officer. There’s no question, these are challenging times. Employees and organizations around the world are doing their best to ...

An Uber Phish

London's Transport for London (TfL) is the entity that manages public transportation and public carriage licenses. In November 2019, TfL stated it would not renew Uber’s Private Hire ...

Trends in Phishing, as Seen From a Mountain View

Researchers from Google’s Threat Analysis Group (TAG) released details on recent state-sponsored phishing campaigns from around the world. The researchers said that Google’s phishing ...

Who Doesn’t Like Free Money? Scammers Are Expected to Increase Use of the COVID Stimulus Bill to Line their Pockets

With cybercriminals loving to be able to target victims where money is directly involved, security experts are anticipating a massive uptick in Stimulus-related scams.

New Video Module "Covid-19 Best Practices" from KnowBe4 and Transperfect

Here is a quick announcement!

The Paradox of Perfection

One of the challenges with living in a hyper-connected world is that it’s easy for anyone to stand on a soapbox and point out when something is wrong.

Hospitality Provider the Target of an Old-School BadUSB Social Engineering Attack

In what appears to be a mix of old- and new-school social engineering, an attack spotted in the wild using a USB thumb drive offers us a view into how one company could have become the ...

Scammers Hijacking Twitter Accounts To Sell Face Masks

Scammers cashing in on the Coronavirus crisis are now hijacking Twitter accounts to heavily promote a web site purporting to sell face masks, respirators, digital thermometers, and toilet ...

Inception: Your Employee's Mind is the Scene of the Crime

I loved the movie Inception when it came out. It had everything, a stellar cast, amazing visuals, a strong plot, and a twisted end that still has me wondering whether or not they were in ...

Every Computer Defense Has Three Main Pillars

Defense-in-Depth is a dogmatic term used in the computer defense industry to indicate that every computer defense has to be made up of multiple, overlapping defenses positioned to best ...

[HEADS UP] Cybercriminals Attempt to Exploit Stimulus Package for COVID-19

In several recent blog posts we've showed you the myriad ways in which malicious actors have aggressively -- even ruthlessly -- deployed social engineering tactics to leverage the ...

FBI Warns of Stimulus Check Scams

The FBI's Internet Crime Complaint Center (IC3) issued an alert warning of coronavirus-related phishing attacks, particularly surrounding economic stimulus checks. The news that the US ...

Beware! The FCC Releases Audio Samples of Coronavirus Phone Scams

Scammers sink to a new low with these phone scams preying on the fears of U.S. citizens offering hopes of better protecting themselves from the Coronavirus.

Ransomware Incidents Increase 131 Percent with the SMB Being the Primary Target

The recent release of new data from U.K. cyberinsurer Beazley’s brings to light what kinds of attacks their customers are experiencing and who’s at risk.

Sextortion Scam Combines Lust and Envy

A sleazy phishing campaign is trying to tempt people into opening an attachment that supposedly contains nude pictures of a friend’s girlfriend, BleepingComputer reports. The attackers ...

Brand Impersonation Phishing Attacks Grow While Organizations Fail to Protect Their Brand Using DMARC

New data from Security vendor Agari shows how identity deception techniques are being used to fool recipient victims as organizations lack the needed safeguards to ensure emails are ...

An Intimate Look at a Nigerian Social Engineer

Researchers at Check Point offer a look at a Nigerian citizen who moonlights as a cybercriminal who uses social engineering techniques. The man, whom the researchers call “Dton,” ...

Just How Lucrative is Cybercrime? According to New Charges Against One Gang, $30 Million Lucrative

The recent arrest and charging of a gang of 24 U.S.-based cybercriminals in Atlanta demonstrates how easy it is to become a cybercriminal and use social engineering tactics to fool people ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.