Security Awareness Training Blog

Security Awareness Training Blog

Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.

Scammer Who Tricked Facebook and Google Out of $120 Million Gets 5 Years in Jail

The Lithuanian hacker who ran the most notorious, simplest, and most lucrative email-based social engineering fraud scam has been brought to justice and will be serving time and paying ...
Continue Reading

Of Course, Scammers Exploit Fears of Iranian Hacking

A new phishing campaign is attempting to frighten people into handing over their credentials by claiming Microsoft was hacked by Iran, BleepingComputer reports. The campaign is ...
Continue Reading

JudicialWatch: "Epidemic of Government Employees Watching Porn on Taxpayer Time"

I'd like to point at a type of security behavior that is enormously risky. Judicial Watch just released a post that's a major heads-up for anyone: "An epidemic of federal employees ...
Continue Reading

December Content Update: Includes New Versions of Email Exposure Check Pro and Phishing Security Test Tools

Here are a few important updates to share with you from the month of December.
Continue Reading

Smishing Examples & Defenses

Smishing is phishing via Short Message Service (SMS) on a participating device, usually a cell phone. Long neglected by phishers and spammers, smishing has recently become a very common ...
Continue Reading

Mobile Threats Shouldn't be Overlooked

Phishing attacks against mobile devices can be just as damaging to an organization as attacks targeting workstations and laptops, according to a market report by Cyber Security Hub. ...
Continue Reading

Encryption Isn’t Your Only Ransomware Problem - There Are Some Other Nasty Issues

Ransomware has become one of the most dreaded problems in the cyber world and it’s only getting worse. Much worse!
Continue Reading

Phishing Emails on the Rise as Spear Phishing Continues to Return Bigger Payouts

New data from Microsoft Security Insights sheds some needed light on exactly what the bad guys are doing and how they’re shifting tactics. Sometimes it feels like the bad guys are ...
Continue Reading

Smishing and Deepfakes Top the List of Cyber Attack Methods Expected in 2020

You want to know what to expect from data breaches, phishing attacks, and other calculated methods in 2020? There’s no better source than Experian’s seventh-annual Data Breach Industry ...
Continue Reading

Business Email Compromise Attack Uses a “Man-in-the-Middle” Email Attack to Steal $1M

Dubbed the “ultimate” Man-in-the-Middle attack by security researchers at Checkpoint, this CEO fraud attack shows how brazen cybercriminals can be – and how organizations need to be ...
Continue Reading

Ransomware Attacks Step Up their Game and Now Look for NAS Devices

It used to be that ransomware just looked for office files. Then backups became a secondary victim. New data from Kaspersky shows NAS devices are being added as targets.
Continue Reading

New TrickBot Malware Attack Leverages Google Drive to Deliver Its Payload and Ensure Infection

New details from Palo Alto Network’s Unit 42 research team show TrickBot rearing its ugly head once again, using legitimate cloud services – and employee greed – as its path to success. ...
Continue Reading

Penn State Warns of Spear Phishing Attacks

Penn State is warning its community about a recent spike in phishing attacks targeting the university’s employees. Attackers are sending emails posing as real Penn State employees and ...
Continue Reading

Security Generation Gaps

People from different generations tend to approach cybersecurity differently. Organizations should tailor their security programs and phishing tests with this in mind. According to Azeem ...
Continue Reading

Announcing A New 8-Minute Training Module - Social Media: Staying Secure in a Connected World

As you probably know, social media is the number one place that attackers can get intel about your organization to make their "hacking of your humans" more effective. We have been hearing ...
Continue Reading

U.S. Government Issues Warning About Possible Iranian Cyberattacks

Christopher C. Krebs, Director of Cybersecurity and Infrastructure Security Agency issued a warning about a potential new wave of Iranian cyber-attacks targeting U.S. assets after Maj. ...
Continue Reading

Seven Kinds of Malware, and all Arrive by Social Engineering

Naked Security outlines seven different categories of malware and describes how each of them through social engineering techniques can affect your organization. Some or all of these ...
Continue Reading

Global Climate Change Phishbait

A number of phishing campaigns have been using Christmas-themed emails encouraging recipients to support climate activist Greta Thunberg, according to Paul Ducklin at Naked Security. ...
Continue Reading

Wawa Data Breach Class Action Filed

There was a massive data breach suffered by Wawa, a convenience store chain of more than 850 stores around the country. Wawa had recently disclosed that it had suffered a data breach that ...
Continue Reading

75% of European Enterprises Cite a Lack of Awareness Training a Challenge to Establish a Proper Cybersecurity Stance

The latest data from VMware and Forbes Insights shows organizations across EMEA are deficient in a number of fundamental cybersecurity needs.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews