Security Awareness Training Blog

Spear Phishing Blog

Learn about current spear phishing attacks, specific examples, and techniques the bad guys are currently using so your users don't fall for these attacks.

CTO of media company faked-out employees with "phishing" emails

There is a fascinating article in SC Magazine dated July 3, 2013 which tells the story of Atlantic Media Chief Technology Officer Tom Cochran, who blasted out a simulated phishing email ...
Continue Reading

Five Ways Your Employees Can Kill Your Company

One - Insider Threat: Stealing valuable information for either profit or idealistic motives. Examples: Software developers taking home code for their next job, sales people downloading ...
Continue Reading

The Inevitability Of "The Click"

From the 2013 Verizon Data Breach Investigations Report. Note that i t only takes 20 emails to get one successful click on a phishing attack. Read the story above!
Continue Reading

FBI Warns of Spear-Phishing Attacks

Spear-phishing attacks are up, and they are targeting individuals across all industries, according to a new warning issued by the U.S. Federal Bureau of Investigation .
Continue Reading

How Zombie Phones Could Create a Gigantic, Mobile Botnet

Seen "World War Z" recently? Your mobile phone might soon be infected and become a zombie.
Continue Reading

Why Business Is Losing The War Against Cybercrime

Price Waterhouse (PwC) and CSO Magazine just released their 2013 State of Cybercrime Survey. It shows that lack of risk awareness means companies are poorly defended. This is their 11th ...
Continue Reading

Scam Of The Week: CIA Prism Watchlist

Scam Of The Week: CIA Prism Watchlist Just this morning, a researcher discovered an email uploaded to Virustotal called CIA's_prism_Watchlist_.eml. The content refers to Snowden, and the ...
Continue Reading

The Three Types Of Cyberattacks

Eugene Kaspersky recently gave one of his very rare interviews. He was in Israel for a staff recruitment tour, and was quoted saying:"
Continue Reading

Data Breach Costs: 10 Ways You're Making It Worse

Inadequate response plans and poorly executed procedures caused data breach costs to rise significantly at some businesses, according to the Ponemon Institute. Mistakes, negligence and ...
Continue Reading

Citadel 'Shutdown' Just A Microsoft PR Move

It was all over the news. The Citadel botnet responsible for stealing more than 500 million dollars out of bank accounts from both individuals and organizations worldwide has been largely ...
Continue Reading

Did China Leak Prism Deliberately?

UPDATED June 9: 16:51p - In an interview with TechCrunch, Eugene H. Spafford, a computer science professor at Purdue and a noted expert in computer security observed something ...
Continue Reading

46 Percent Of Hospital’S Hacked Money Gone For Good

Chelan County Treasurer David Griffiths says Leavenworth's hospital district stands to recover less than half the $1 million stolen in an online banking theft. About $415,000 has been ...
Continue Reading

New Fun Little Quiz: How Phish-prone Are You?

We created a fun new little quiz you could send to your users!
Continue Reading

How the Syrian Electronic Army Hacked The Onion

This is a write-up of how the Syrian Electronic Army hacked The Onion using spear-phising. In summary, they phished Onion employees’ Google Apps accounts via 3 separate methods. From ...
Continue Reading

Cybercrime Targets: C-Level execs, HR managers and System Admins

According to a recent research of Group-IB on cybercrime, senior management is considered among most popular targets.
Continue Reading

The Seven Deadly Social Engineering Vices

(updated June 17, 2015) You may not be aware that there is a scale of seven deadly vices connected to social engineering. The deadliest social engineering attacks are the ones that have ...
Continue Reading

0-Day Threats and Security Awareness

OK, we all know that there is a lively trade in 0-day threats. Often this is an unknown vulnerability in a popular browser that is not fixed yet. Microsoft recently announced they fixed ...
Continue Reading

Phishing Scam Of The Week: Walmart.com

Wal-Mart took special effort this week and warned customers of an unusually 'high quality' phishing email that tries to get personal and credit information. They stated on their corporate ...
Continue Reading

Cybercrime Attack Vector Of Choice: Employees

Today, employees are the low hanging fruit for cybercrime. Organizations counter this with what is called 'Security Awareness Training' (SAT), but modern SAT is far removed from how it ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews