KnowBe4 Fresh Content Update & New Features October 2018
Check out the content and feature updates in the KnowBe4 platform for the month of October!
Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.
Check out the content and feature updates in the KnowBe4 platform for the month of October!
The Tesla founder’s recent tweet about cryptocurrency got him temporarily locked out of his Twitter account, demonstrating the seriousness of the scam.
Ignorance of security policies and security threats is one of the primary reasons why employees break cybersecurity rules, says Ericka Chickowski at Dark Reading. A study conducted by ...
New data from the 2018 Chubb Cyber Risk Survey shows people and companies have a false sense of cybersecurity and aren’t really doing much about it.
Phony police calls in the US have been telling people they need to pay a fine for missing jury duty. In the UK the scams take a different form: the bogus police are asking for the ...
Fraudsters have all but eliminated indicators used to detect fake identities on line, reports Socure, a predictive analytics provider. The difference between authentic and fake identities ...
The latest attack from the Russian GRU involves both traditional spear phishing and close access attacks in an attempt to thwart an investigation of the nerve agent attack in the UK.
Cybercriminals thrive on misuse of credentials, and users sharing them only makes the criminal’s job easier. The latest report from LastPass shows password sharing is rampant.
You’re already worried about the possibility of becoming a victim of a cyber scam. Be sure you clearly understand what your cyber insurance coverage is, or you may feel like you got taken ...
We are excited to announce the availability of two new features, Virtual Risk Officer and Advanced Reporting.
To start your National Cyber Security Awareness Month (NCSAM) here is a goodie for your users to kick things off.
The operation run by botnet author Peter Levashov demonstrates how easy it is for would-be criminals to get into the business.
This is common wisdom, but it bears repeating, because common wisdom is easily overlooked. People are often called an organization's greatest asset. They're also its greatest ...
Curtin Franklin at Darkreading correctly observed: "USB thumb drives may be used less frequently than before, but they are still commonly used as infection vectors for a wide variety of ...
Charlie Osborne reported at ZDNet that Adwind, a Remote Access Trojan (RAT) previously connected to attacks against industries worldwide, is back with a new toolkit designed to trick ...
Microsoft Office documents containing malicious macros accounted for 45 percent of malware loaders in August 2018, according to a blog post by Cofense. These macros were used to deliver a ...
New research shows 25% of users falling victim to impersonation fraud were so ashamed they chose not to report it. Even worse, many don’t know how to spot the scam.
Red teaming starts with research. So does social engineering. Red teaming is the practice of thinking and acting like an attacker to test an organization’s defenses, according to security ...
Just in time before October's Cybersecurity Awareness Month, DomainTools released its second annual Cybersecurity Report Card in which infosec pros were surveyed about their security ...
This latest story about one specific cybercriminal group shows how even the most trusted of white-hats can give in to the lure of financial profit, following Evgeniy Bogachev who retired ...