Human Risk Management Blog

Social Engineering

Latest social engineering news, analysis, tactics the bad guys are using and what you can do to defend your organization.

Scammers Exploit Rollout of COVID-19 Contact-Tracing Apps

An SMS phishing campaign is telling people they’ve come into contact with someone who’s contracted COVID-19, Computing reports. The UK’s Chartered Trading Standards Institute (CTSI) ...

Dutch Online Retailer Wehkamp Loses 144,000 Euros in Bankruptcy Business Email Compromise

Cyber criminals successfully gained access to email traffic between bankruptcy trustees and Wehkamp – one of the biggest online retailers in The Netherlands – writes RTL Z. Employees of ...

That Email from President Trump? Yeah, That’s a Phishing Scam

New phishing scams impersonating President Trump and Vice President Pence are designed to install malware or be the start of an extortion scam.

World's Largest Sovereign Wealth Fund Falls For $10m Social Engineering Attack

The Norwegian Investment Fund has been swindled out of 10 million dollars by fraudsters who pulled off a social engineering attack that the Norfund called "an advanced data breach" but ...

Watch Out for the Coming Tsunami of Mortgage Rescue Phishing Scams

At this point in time, with 10 years of phishing attack analysis under our belt, we can predict with a high reliability level what will be showing up in the near future. We see two scams ...

Why Does Someone Click and Become a Victim of a Scam?

One of the keys to thwarting social engineering attacks is knowing what makes us want to click on links or respond to emails, according to cybersecurity expert Raef Meeuwisse. In an ...

[Scam of The Week] Unemployed Americans Are Now Deceived Into Grabbing ‘Remote Jobs’ As Money Mules

There are now tens of millions of people suddenly unemployed, looking for ways to make ends meet.

Cybercriminals Lean Heavily on Social Engineering Tactics to Gain Access to Bank Accounts

A series of attack anecdotes shared by Brian Krebs shows how persistent and sophisticated scammers are in using social engineering tactics to gain access to their victim’s bank account ...

What is the Right Password Policy?

What is the right password policy? Conventional password policies say you must have a password at least 8-12 characters long…16 characters or longer if it belongs to an elevated ...

Q&A With Data-Driven Evangelist Roger Grimes on the Great Password Debate

I get asked a lot about password policy during my travels around the globe giving presentations and from people who email after webinars. Many of the questions are the same and I’ve ...

Reuters: 'State-backed hackers targeting coronavirus responders'

LONDON/WASHINGTON (Reuters) - Government-backed hackers are attacking healthcare and research institutions in an effort to steal valuable information about efforts to contain the new ...

PerSwaysion: Convincing Executives to Act Against Their Own Interest

Researchers at Group-IB have discovered a sophisticated spear phishing campaign that’s targeted executives at more than 150 companies around the world since mid-2019. The researchers have ...

GitHub is the Latest Target of Social Engineering Phishing Attacks

Using simple alert-style email notices, scammers look to steal credentials to gain access to development code, intellectual property, and project details.

Half of all Breaches Start with Phishing and Social Engineering

New data shows successful attacks on internal networks, cloud environments, and POS systems all are very susceptible to this common attack vector.

Is That COVID-19 Email Legitimate or a Phish?

It’s no surprise that phishers and scammers are using the avalanche of new information and events involving the global coronavirus pandemic as a way to successfully phish more victims. ...

Scammers Can Use Recent Transactions to Trick You

KrebsOnSecurity reports that scammers are using caller ID spoofing to impersonate their victims, and then socially engineering victims’ banks into divulging information about recent ...

[Heads Up] Microsoft: Ransomware Gangs That Don't Threaten To Leak Your Data Steal It Anyway

That means you can from now on count a ransomware infection as a data breach with all the consequences that this brings. Moreover, the so-called "human-operated" ransomware gangs have ...

[Click Alert] So, What Is The Phish-prone Percentage On Recent Coronavirus Phishing Tests?

I had some numbers run on the usage of our new, dedicated COVID-19 phishing templates to find out what the Phish-prone percentage was, since this is an unprecedented worldwide event. ...

Postcards from a Film Director. The challenges of creating a sitcom during COVID-19 Lockdown

By Jim Shields, Managing Director of U.K.-based Twist & Shout - a KnowBe4 company. When we first created Restricted Intelligence over seven years ago, we had no idea it would be so ...

COVID-19 Emails go From Zero to Half a Million a Day in Just Three Months

According to new data from security researchers at Forcepoint, the interest in coronavirus-themed emails and websites by cybercriminals is cause for concern.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.