Introducing the KnowBe4 Academy: Your Path to Mastering Human Risk Management

We're thrilled to announce the launch of KnowBe4 Academy—a comprehensive learning ecosystem designed specifically for security administrators, IT professionals and team members who manage ...
Continue Reading

Social Engineering Campaign Abuses Zoom to Install Malware

A social engineering campaign is abusing Zoom's remote control feature to take control of victims’ computers and install malware, according to researchers at security firm Trail of Bits.
Continue Reading

Half of Organizations Lack Protection Against Email Spoofing

A new report from Valimail has found that 50% of organizations lack effective protection against email spoofing.
Continue Reading

Broken Cyber Windows Theory

Have you ever walked down a street with broken windows, burnt out cars, graffiti and felt a bit uneasy? There's a reason for that, and it's not just about aesthetics.
Continue Reading

Threat Actors Are Increasingly Abusing AI Tools to Help With Scams

Cybercriminals are increasingly using AI tools to assist in malicious activities, according to Microsoft’s latest Cyber Signals report.
Continue Reading

Powering Down Vulnerability: Securing the Energy Sector's Supply Chain

The energy sector stands as a critical pillar of our society. From the electricity powering our homes to the fuel driving our industries, reliable energy is essential. However, the very ...
Continue Reading

China Cybercriminals Behind Toll-Themed Smishing Attacks Surge in the US and UK

Resecurity warns that a China-based cybercriminal gang dubbed the “Smishing Triad” is launching a wave of road toll-themed SMS phishing (smishing) attacks against users across the US and ...
Continue Reading

How Does Human Risk Management Differ from Security Awareness Training?

In today's cybersecurity landscape, organizations face an ever-present and often underestimated threat: human risk. Despite significant advancements in technological defenses, human error ...
Continue Reading

UK Organizations Cite Phishing as the Most Disruptive Type of Cyberattack

Phishing was the most prevalent and disruptive type of attack experienced by UK organizations over the past twelve months, according to the British government’s Cyber Security Breaches ...
Continue Reading

Europe's Energy Sector at Risk: The Critical Need for Cybersecurity

Reliable energy is the backbone of any modern society. It powers our homes, industries, and economies. But what happens when this essential infrastructure becomes a target for ...
Continue Reading

Shadow AI: A New Insider Risk for Cybersecurity Teams to Tackle Now

Disclaimer: Don't get me wrong, I love using generative AI daily for research and writing. This is about how other users could be using it when they don't know what they don't know and ...
Continue Reading

64% of Australian Organizations Hit by Ransomware Were Forced to Halt Operations

Illumio’s recent Global Cost of Ransomware Study found that 64% of Australian companies hit by ransomware had to shut down operations as a result.
Continue Reading

Seeing (and Hearing) Isn’t Believing: My SEC Presentation on AI-Driven Scams

On March 6, I had the opportunity to speak and provide testimony at the SEC Investor Advisory Committee’s panel on Retail Investor Fraud in America—a critical discussion about how AI is ...
Continue Reading

Russian Threat Actor Launches Spear-Phishing Campaign Against Ukrainians

The Russian threat actor Gamaredon is targeting Ukrainians with spear-phishing documents related to troop movements, according to researchers at Cisco Talos.
Continue Reading

[HEADS UP] North Korea Expands Its Fraudulent IT Worker Operations

North Korea’s fraudulent employment operations have expanded to hit countries around the world, with a particular focus on Europe, according to researchers at Google’s Threat Intelligence ...
Continue Reading

The Real Deal: How Cybercriminals Exploit Legitimate Domains

When it comes to secure email gateways (SEGs), the narrative is quite simple. For years, organizations have relied on SEGs as the foundation of their email security.
Continue Reading

Upgraded Phishing-as-a-Service Platform Drives a Wave of Smishing Attacks

A phishing-as-a-service (PhaaS) platform dubbed ‘Lucid’ is driving a surge in SMS phishing (smishing) attacks, according to researchers at Prodaft.
Continue Reading

Online Gaming Platform Steam Tops List of Most Imitated Brands For the First Time

Steam was the most impersonated brand in phishing attacks during the first quarter of 2025, according to a new report from Guardio. The researchers note that the gaming platform’s surge ...
Continue Reading

Phishing Attacks Lead to Theft in the Shipping Industry

Phishing attacks are driving a surge in “double brokering” scams in the shipping industry, according to Christian Reilly, Cloudflare’s Field CTO for EMEA.
Continue Reading

[Heads Up] QR Code Phishing is Getting More Stealthy Fast

Attackers are using new tactics in QR code phishing (quishing) attacks, according to researchers at Palo Alto Networks’ Unit 42.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews

close