Human Risk Management Blog

Social Engineering

Latest social engineering news, analysis, tactics the bad guys are using and what you can do to defend your organization.

Summit Sabotage: Malicious Phishing Campaign Hits Female Political Leaders Using Social Engineering

A threat actor dubbed “Void Rabisu” used social engineering to target attendees of the Women Political Leaders (WPL) Summit that was held in Brussels from June 7 to 8, 2023, Trend Micro ...

9 in 10 CISOs Report at Least One Disruptive Cyberattack in the Last Year

A new report sheds light on whether CISOs have been the victim of a cyber attacks, if they're every paid a ransom, their greatest cyber concerns, and much more.

60% of Organizations are Very Concerned About the Potential Impact of Ransomware Attacks

As the number of reported ransomware attacks increases, new data provides a fresh look at how ready organizations are for ransomware attacks.

53% of Organizations Experienced Cyber Attacks

As increasing percentages of businesses experience cyberattacks, new data provides details on where the most organizational risk lies.

Should You Use Controversial Simulated Phishing Test Emails?

The Wall Street Journal recently published an article about using highly-emotionally charged, “controversial”, subjects in simulated phishing tests. Controversial topic examples include ...

New Research: Phishing Remains the Most Popular Technique for Bad Actors

A report from Trustwave notes that phishing remains one of the most popular and effective techniques for attackers to gain access to organizations.

Beware of Bogus Roborock Retailers: The Perils of Misleading URLs in E-Commerce

Roborock's online storefronts have been used for cybercrime schemes in the past, and it seems attackers are continuing to create fake online shops. After all, the Chinese-originated robot ...

Harvested Credentials Are Put Up for Sale Monthly on the Dark Web at a Rate of 10,000 a Month

Credential harvesting has become a business in and of itself within the cybercrime economy. New insight from Microsoft details the types of attacks your organization should watch out for.

New Cyber Attack Techniques Will Not Replace Old-School Social Engineering

Even though there are new attack types for cybercriminals, they are still leveraging old-school attack vectors. Why? Because they still work.

Business Email Compromise Attempts Skyrocket in the Last Year

Threat actors launched 156,000 business email compromise (BEC) attempts per day between April 2022 and April 2023, according to Microsoft’s latest Digital Defense Report. While most of ...

[INFOGRAPHIC] KnowBe4’s SecurityCoach: Top 10 Integrations

Real-time security coaching helps improve your organization’s security culture by enabling real-time coaching of your users in response to risky security behaviors.

Smishing Triad Threat Actor Sets Its Sights on the UAE

Resecurity warns that the Smishing Triad threat actor has “vastly expanded its attack footprint” in the United Arab Emirates (UAE).

Stay a Step Ahead of your #1 Downtime Threat - Business Email Compromise

A new report from Secureworks has found that business email compromise (BEC) remains “one of the most financially damaging online crimes overall for orgs” in 2023. The security firm’s ...

Generative AI and the Automation of Social Engineering Increasingly Used By Threat Actors

Threat actors continue to use generative AI tools to craft convincing social engineering attacks, according to Glory Kaburu at Cryptopolitan.

It’s Official – Generative AI Has Made Phishing Emails Foolproof

The most basic use of tools like ChatGPT to script out professional-looking emails has all but eliminated improperly written content as an indicator of a potential phishing scam.

Threat Group UNC3944 Continues to See Success Using Text-Based Social Engineering

A new update on UNC3944 group's activities shows how they are evolving their focus squarely on SMiShing credential harvesting attacks that result in data theft/extortion attacks.

Pharma Industry Seeing Reduction in Data Breach Costs, But Still Have Much to Do

Insights from IBM’s Cost of a Data Breach Report on the Pharmaceutical Industry shows that while the overall cost has improved, there are clear areas of risk that need to be addressed.

[Cybersecurity Awareness Month] Frankenphisher – The Monster of Social Engineering Artificial Intelligence

Imagine an artificial intelligence (AI) system developed by a mad scientist to leverage the full capabilities of Large-Language-Models (LLM).

Why BJ Fogg and Daniel Kahneman Are Big Security Pro Must-Knows

You're no stranger to the complexities of safeguarding your organization's digital assets. But have you considered the human element in your security equation? Behavioral economics, ...

[NEW RELEASE]: Unleash the Power of Cybersecurity Education with KnowBe4’s 'Hack-A-Cat' on Roblox

What do cheese, fish and cybersecurity training have in common? Each of these comes together to help keep kids informed about cyber threats and cybersecurity best practices with KnowBe4’s ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.