Security Awareness Training

KnowBe4 Security Awareness Training Blog KnowBe4’s blog keeps you informed about the latest in security including social engineering, ransomware and phishing attacks.

  • State-Sponsored Phishing Campaigns Target 40,000 VIP Individuals
    by Stu Sjouwerman on July 5, 2024 at 6:00 pm

    Researchers at Menlo Security discovered three state-sponsored phishing campaigns that have targeted 40,000 important individuals over the past three months.“In a recent 90-day period, Menlo Labs uncovered a trifecta of sophisticated [highly evasive and adaptive threat] campaigns—LegalQloud, Eqooqp, and Boomer—compromising at least 40,000 high-value users, including C-suite executives from major banking institutions, financial powerhouses, insurance giants, legal firms, government agencies, and healthcare providers, the researchers write. “The breadth and depth of these breaches signal an alarming escalation in cyber warfare.” The first campaign, “LegalQloud,” is impersonating Microsoft to target government workers and investment bankers in North America.“LegalQloud targets governments and investment banks in North America and impersonates the names of >500 legal firms and steals credentials,” Menlo Security writes. “The attack impersonates the Microsoft brand and is hosted on the Tencent Cloud (Tencent is the largest Internet company in China). The associated domain is not blocked by URL categorization and related blocklist services. This threat is hosted globally and predominantly targets government entities in North America. LegalQloud targets investment banks as a second focus.”The second campaign, called “Eqoop,” can bypass multifactor authentication and is targeting entities in the logistics, finance, petroleum, manufacturing, higher education, and research sectors. Menlo Security has detected nearly 50,000 attacks tied to this operation.The third campaign, tracked as “Boomer,” uses a combination of sophisticated techniques throughout the attack chain. “Boomer targets government and healthcare sectors,” the researchers write. “The evasive techniques and software development tradecraft exceed previously identified campaigns. Boomer will avoid detection if only traditional controls are in place. Boomer uses orchestrated, dynamic phishing sites, cookies, server-side logic, bot-detection countermeasures, encrypted code, and other techniques to increase the attack’s reach and stealth.”

  • Don’t Fall for It: How to Spot Social Media Job Scams a Mile Away
    by Anna Collard on July 5, 2024 at 1:24 pm

    As social media becomes more intertwined with our daily routines, cybercriminals are using it to trick people with fake job offers. What are these social-media recruitment scams, and how can you spot the red flags?

  • Phishing Attacks Themed Around Popular Weight Loss Drugs Increase 183%
    by Stu Sjouwerman on July 5, 2024 at 1:24 pm

    As popularity grows for these proven methods of weight loss, scammers have taken note and have placed a significant focus on separating victims from their money.

  • New “Paste and Run” Phishing Technique Makes CTRL-V A Cyber Attack Accomplice
    by Stu Sjouwerman on July 5, 2024 at 11:40 am

    A new phishing campaign tries to trick email recipients into pasting and executing malicious commands on their system that installs DarkGate malware.

  • [Urgent Alert] 5 Critical Steps to Shield Your Teens from Rising Sextortion
    by Anna Collard on July 2, 2024 at 5:55 pm

    A few weeks ago I was privileged to visit the 8th grade of a high-school here in Cape Town and talk to the students about cybersecurity, social media, and emerging technology. It was a very rewarding experience but also an eye-opener with regards to the level of cyber awareness amongst adolescents.

  • Ransomware Attack on U.K. Health Service Laboratory Disrupts Major London Hospital Services
    by Stu Sjouwerman on July 2, 2024 at 5:55 pm

    What likely started as a quick ransomware “smash and grab” has turned into a headline case resulting in responses from both U.K. and U.S. law enforcement.

  • Hacked Customer Support Portal Being Used to Send Phishing Emails
    by Stu Sjouwerman on July 2, 2024 at 5:55 pm

    A hacked customer support portal belonging to router manufacturer Mercku is being used to respond to customer queries with phishing emails, BleepingComputer reports.

  • CyberheistNews Vol 14 #27 [Important Alert] TeamViewer Network Breached as Russian APT29 Hackers Strike Again
    by Stu Sjouwerman on July 2, 2024 at 1:03 pm
  • The Curious Case of the Payroll Pilfering
    by Javvad Malik on July 1, 2024 at 5:54 pm

    In a world where cyber espionage has become as common as a rainy day in London, the recent events surrounding the UK armed forces’ payroll database have had us all raising our eyebrows higher than a butler’s in a posh British drama.

  • New Malware Campaign Impersonates AI Tools To Trick Users
    by Stu Sjouwerman on July 1, 2024 at 5:54 pm

    Researchers at ESET warn that malvertising campaigns are impersonating AI tools to trick users into installing malware. The Rilide infostealer, for example, is being distributed via a malicious browser extension posing as Sora or Gemini.

Share Websitecyber