Security Awareness Training Blog

Social Engineering Blog

Latest social engineering news, analysis, tactics the bad guys are using and what you can do to defend your organization.

Email Conversation Hacking to Distribute Malware

Researchers at Intezer warn that attackers are hijacking email conversations to distribute the IcedID banking Trojan. This technique makes the phishing emails appear more legitimate and ...
Continue Reading

Making Better Push-Based MFA

I used to be a huge fan of Push-Based Multifactor Authentication (MFA), but real-world use has shown that most of today’s most popular implementations are not sufficiently protective ...
Continue Reading

Buy Now, Pay Later Scams

Fraudsters are taking advantage of the buy-now, pay-later (BNPL) payment model, according to Jim Ducharme, COO of Outseer. On the CyberWire’s Hacking Humans podcast, Ducharme explained ...
Continue Reading

Initial Access Broker Group Relies on Social Engineering

Google’s Threat Analysis Group (TAG) describes a cybercriminal group it calls “EXOTIC LILY” that acts as an initial access broker for numerous financially motivated threat actors, ...
Continue Reading

Number of Phishing Attacks Hits an All-Time High in 2021, Tripling That of Early 2020

New data from the Anti-Phishing Working Group shows cybercriminals are stepping on the gas, focusing phishing attacks on credential theft and response-based scams.
Continue Reading

Published Zelenskyy Deepfake Video Demonstrates the Modern War is Online

The video uploaded to a hacked Ukrainian news website shows how far the technology has come, how it can be used in social engineering, as well as how the tech still needs to improve.
Continue Reading

SMBs Are 350% More Likely to Experience Social Engineering Attacks Via Phishing

New data shows phishing, social engineering, and impersonation dominate as cybercriminals are becoming more frequent and successful with their attacks.
Continue Reading

KnowBe4 Named a Leader in The Forrester Wave for Security Awareness and Training Solutions

We’re thrilled to announce that KnowBe4 has been named a Leader in The Forrester WaveTM : Security Awareness and Training Solutions, Q1 2022 report based on our current offering, strategy ...
Continue Reading

Shipping Fraud Rises Nearly 800% in 2021

Shipping fraud had a global increase of nearly 800% over the course of 2021, according to TransUnion’s 2022 Global Digital Fraud Trends Report.
Continue Reading

Social Engineering through Contact Form

Email is the familiar form of phishing, but there’s an ongoing criminal campaign that follows a different, arguably subtler avenue of approach: the corporate contact form. Abnormal ...
Continue Reading

Social Engineering a Major Factor in Cyberattack on Camera Maker Axis Communications

As details of the February attack continue to be divulged, it becomes evident that cybercriminals were able to get past both users and security controls.
Continue Reading

[World Premiere] KnowBe4’s New Season 4 of Netflix-Style Security Awareness Video Series - ‘The Inside Man’

We’re thrilled to announce the long-awaited fourth season of the award-winning KnowBe4 Original Series - ‘The Inside Man’ is now available in the KnowBe4 ModStore!
Continue Reading

FBI: Scammers Take Business Email Compromise Attacks to Virtual Meeting Platforms

In a new twist on an old scam, BEC attacks switch from email to a virtual meeting where social engineering tactics are used to further establish credibility and increase the likelihood of ...
Continue Reading

What It's Like to Be the Face of Romance (Scams)

A real US Army colonel named Daniel Blackmon is being impersonated in hundreds or even thousands of romance scams, according to Haley Britzky at Task & Purpose. The scammers took ...
Continue Reading

Scammers Will Take Advantage of New IRS Rules

New IRS requirements will soon be used as phishbait, according to Gene Marks, owner of Marks Group PC and a columnist for the Guardian.
Continue Reading

Wartime Suffering as Phishbait

It’s easy to forget, when a hybrid war like the one currently raging in Ukraine is occupying so much attention, that ordinary criminal lowlifes continue to seek victims, and the war only ...
Continue Reading

20 Year-Old “Right-to-Left Override” Functionality Used in Attacks to Trick Microsoft 365 Users Out of Credentials

Used to disguise malicious file extensions, this legacy functionality is being repurposed in attacks to obfuscate attachment types and steal credentials in an impressive way.
Continue Reading

New QBot Attack Only Takes 30 Minutes to Elevate Privileges and Steal Data

This banking trojan-turned-information-stealer has been around for nearly 15 years. But its latest iteration – seen even in the past few weeks – has stepped up in its’ ability to act ...
Continue Reading

The 4 Things You Should Be Doing Right Now To Best Improve Your Cybersecurity

The key to really good cybersecurity is to concentrate on just 4 things. Master them first before you begin to try and do the other hundreds of things that everyone else is going to tell ...
Continue Reading

Web Trackers Collect Much More Info About Your Users’ Browsing Activity Than Previously Believed

Researchers at Norton LifeLock have found that web trackers are collecting much more information about users’ browsing activity than had previously been believed. Such trackers can follow ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews