Human Risk Management Blog

Security Awareness Training

Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.

New Norton LifeLock Phishing Scam Installs Remote Access Trojan

In yet another case of brand impersonation, this new phishing scam seeks out the millions of LifeLock customers and follows a seasoned infection path, with the goal being persistence and ...

Yet Another Utility Company Falls Victim to Ransomware Attack

The latest ransomware attack on yet another utility company echos the warnings from last year’s report on utilities’ readiness for a cyberattack.

Anti-Virus, Identity Protection Phishbait

A phishing campaign is using fake NortonLifelock documents to trick victims into installing a remote access tool, according to researchers at Palo Alto Networks’ Unit 42. The documents ...

KnowBe4 and Agari Announce New Partnership to Transform Phishing Protection

As market leaders, KnowBe4 and Agari have joined forces to help stop identity-based email attacks. Together, we have created a best-in-class approach to defend against phishing attacks at ...

New Sophisticated Credential-Stealing Malware, Forelord, Attacks the Middle East

This latest APT highlights the levels of sophistication attackers will go to just to establish persistence, infect the endpoint, and steal credentials from the victim organization.

Courts Limit Payout on Insurance Claim to Just One Section of the Liability Policy

The latest ruling shows how the courts are becoming well-versed in the ways of cyberattacks, and are holding both insurers and policyholders to the letter of the contract.

Social Security Administration Warns of Phone Scams On March 5th "Slam The Scam Day"

The Social Security Administration in Association with the Federal Trade Commission's (FTC) National Consumer Protection Week, want to remind everyone that scammers are now targeting ...

[On-Demand] Never Assume Breach: Build a Data-Driven Defense Strategy to Secure Your Organization's Most Valuable Assets

Even the world’s most successful organizations have significant weaknesses in their IT security defenses, which today’s determined hackers can exploit at will. There’s even a term for it: ...

Cut-and-Paste Phishbait

Naked Security describes a phishing campaign that’s convincingly spoofing emails from the online payment company Stripe. The email informs the recipient that an unknown device has logged ...

Data Breach After Effects: Consequences and Learning Lessons

If you think your organization is safe from a data breach, think again. Data breaches could be deadly for any organization big or small.

New Sophisticated “Exaggerated Lion” BEC Check Scam Uses Mules to Cash Out

You may wonder exactly how BEC scammers see a payday. New insight from security vendor Agari documents how a secondary check scam dupes unsuspecting victims to help.

Racoon: Infostealer Malware Collects Credentials, Financial and Personal Information

Access to a compromised endpoint may no longer be enough. So, enterprising malware authors offer up infostealers to help exfiltrate valuable data from an infected machine.

None But the Lonely Heart Would Fall for an Emoji

Researchers at Malwarebytes and X-Force IRIS have come across an ongoing phishing campaign that’s using romance-themed emails to distribute the Nemty ransomware, BleepingComputer reports. ...

Afraid You're Communicating Too Frequently? Rethink That.

This blog was co-written by Joanna Huismann and Aimee Laycock. Communication is not always easy (let’s be honest, we have all wanted to scream with frustration at our partner or a family ...

Guess Who Else is Now Doing Security Training Surveys?

By Eric Howes, KnowBe4 Principal Lab Researcher. A few months ago, KnowBe4 began offering customers two new kinds of scientifically-based assessments to help IT departments get a better ...

Verizon: More Than Half of Users Click on Multiple Phishing Links. Social Engineering, Innovation are Responsible

The latest data from Verizon’s 2020 Mobile Security Index report shows that both consumer and business users make it all too easy for cyberattackers to fool them into becoming a victim.

An Influence or Wire Fraud?

A 22-year-old Instagram and YouTube influencer named Kayla Massa has been arrested after allegedly convincing her followers to assist her in a fraud scheme, Quartz reports. Prosecutors ...

39 Percent of Organizations Were Victims of a Mobile Attack Despite Improved Security

Brand new data from Verizon shows businesses sacrificed when it comes to mobile security; a decision that caused compromises with impacts well-beyond just a simple breach.

KnowBe4 Named a Leader in The Forrester Wave for Security Awareness and Training Solutions

We have some great news to share with our customers and global security professionals alike. KnowBe4 has been named a Leader in The Forrester Wave™ : Security Awareness and Training ...

Why Minimizing Human Error is the Only Viable Defense Against Spear Phishing

Phishing attacks have become one of the business world's top cybersecurity concerns. These social engineering attacks have been rising over the years, with the most recent report from the ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.