Psychological Contract Breach and the Power of Security Culture - Research Insights

Employees are expected to behave securely, and the definition of “securely” is often written down in a myriad of security policies. Yet, people do not always comply with security policies ...
Continue Reading

Is your Human Risk Management Program Creating Measurable Change? Find Out with Our Free Program Maturity Assessment

In today's threat landscape, your employees represent both your greatest vulnerability and your strongest defense.
Continue Reading

What Is Human Risk Management?

Cybersecurity has long focused on fortifying networks, securing endpoints and blocking malicious code.
Continue Reading

A Clicking Time Bomb: What To Do About Repeat Clickers

I recently had several conversations about repeat clickers. First with a Forrester analyst and then, shortly after, at KB4-CON Orlando following a presentation on the subject by Matthew ...
Continue Reading

FTC States That Scams Cost U.S. Consumers $158.3 Billion in One Year

I am used to repeating some pretty big numbers when talking about the financial impact of cybercrimes. When you look into the data, it is pretty easy to start talking about tens of ...
Continue Reading

Happy 2nd Birthday to Our KnowBe4 Community!

Can it be? Is it true? Two years of KnowBe4 Community!
Continue Reading

Warning: Voice Deepfakes Continue to Improve

AI-generated voice deepfakes present an urgent threat to organizations, according to researchers at Pindrop.
Continue Reading

Google Report Outlines the Latest Scam Trends

Researchers at Google have published a report on the latest scam trends, noting an increase in travel-themed scams targeting people preparing for their summer vacations.
Continue Reading

Checkups and Checklists: Cyber Risk Isn’t Just a Technical Problem

There are many things in our lives we must prepare for to be ready. For other things, we wing it, or we're not prepared to deal with it at the moment.
Continue Reading

How to Recognize Fraudulent North Korean Job Applicants

Researchers at Socure warn of an ongoing wave of employment fraud driven by North Korean IT operatives attempting to secure positions at foreign companies.
Continue Reading

Human Risk Management: Cybersecurity as a Business Enabler

Reducing human risk in cybersecurity requires a human-first approach that relies on effective training and practice for people to gain security knowledge, practice secure behavior, and ...
Continue Reading

Spear-Phishing Campaign Targets Financial Executives

Researchers at Trellix warn of a spear-phishing campaign that’s targeting CFOs around the world with phony employment offers.
Continue Reading

Warning: Crooks Are Using Vishing Attacks to Compromise Salesforce Instances

A criminal threat actor tracked as “UNC6040” is using voice phishing (vishing) attacks to compromise organizations’ Salesforce instances, according to researchers at Google’s Threat ...
Continue Reading

What Are The Key Components Of A Successful Human Risk Management Program?

When it comes to cybersecurity, organizations face an ever-present and often underestimated threat: human risk.
Continue Reading

Fake MFA Reset Warning Message

A KnowBe4 co-worker of mine recently got this SMS phishing message (i.e., smish).
Continue Reading

FBI Alert: Extortion Gang Targets Law Firms With Social Engineering Attacks

The FBI is warning that the Silent Ransom Group (SRG) is targeting law firms with IT-themed social engineering attacks and callback phishing emails.
Continue Reading

New Unrestricted AI Tool Can Assist in Cybercrime

Researchers at Certo warn that a new AI chatbot called “Venice[.]ai” can allow cybercriminals to easily generate phishing messages or malware code.
Continue Reading

French Users Targeted by Major Phishing Campaign

Researchers at IBM Security warn that a major phishing campaign is targeting users in France, incorporating leaked personal data to make the emails more convincing.
Continue Reading

Threat Actors Are Using AI-Generated Audio to Impersonate U.S. Officials

The FBI is warning that threat actors are impersonating senior US officials in phishing attacks designed to compromise users’ accounts.
Continue Reading

The Lost Art of Writing Things Down

I was once enrolled in a programming module back at university. We had been given a task, to code something, so we all sat banging out whatever code we could on our keyboards.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews