Monthly Archives: September 2022

Latest Cyberthreats and Advisories – September 30, 2022

Russian cybercrime, social media corruption and a tidal wave of malicious app downloads…. ​​Here are the latest threats and advisories for the week of September 30, 2022. Threat Advisories and Alerts CISA Issues Warning to OT/ICS Owners and Operators Operational … Read More

Response-Based Phishing Scams Targeting Corporate Inboxes Hit New Records

Setting a record for both highest count and share in volume with other types of phishing scams, response-based attacks are at their highest since 2020 and are continuing to grow.

Your KnowBe4 Fresh Content Updates from September 2022

Check out the 35 new pieces of training content added in September, alongside the always fresh content update highlights and new features.

55,000 Cybersecurity Candidates Join (ISC)² Workforce Programs in One Month

One month after launching three new initiatives, (ISC)² Candidates, (ISC)² Certified in Cybersecurity SM and (ISC)² One Million Certified in Cybersecurity, aimed at addressing the cybersecurity workforce gap, we are thrilled to share our initial successes. We have seen a rapid adoption within the … Read More

Social Engineering and Bogus Job Offers

Researchers at SentinelOne have warned that North Korea’s Lazarus Group is using phony Crypto.com job offers to distribute macOS malware. The researchers aren’t sure how the lures are being distributed, but they suspect the attackers are sending spear phishing messages … Read More

Announcing This Year’s (ISC)2 Global Achievement Award Recipients – Part 2

This continues our recognition of our Global Achievement Award recipeints. Click here to read more about our award honorees in part one.  (ISC)² Government Professional Award Recognizing government information security leaders whose commitment to excellence has helped to improve government … Read More

A Master Class on Cybersecurity: Roger Grimes Teaches Password Best Practices

What really makes a “strong” password? And why are you and your end-users continually tortured by them? How do hackers crack your passwords with ease? And what can/should you do to improve your organization’s authentication methods?

Top 5 Deepfake Defenses

Imagine you’re on a conference call with your colleagues. Discussing the latest Sales numbers. Information that your competitors would love to get a hold of.

American Airlines Traces Breach to Phishing Incident

American Airlines has disclosed that an attacker used phishing attacks to breach the company’s systems, BleepingComputer reports.

Announcing This Year’s (ISC)2 Global Achievement Award Recipients – Part 1

Congratulations to the following security professionals recognized for their outstanding contributions to the cybersecurity industry. The annual (ISC)² awards honor exceptional practitioners for their commitment to a safer cyber world for one and all. Each will be honored at next … Read More

Fake Emails Purporting to be from UK Energy Regulator

A phishing campaign is impersonating UK energy regulator Ofgem, according to Action Fraud, the UK’s cybercrime reporting centre.

FBI: Cyber Criminals Will Continue Targeting Healthcare Payment Processors Through Phishing Campaigns and Social Engineering

Despite the pandemic being largely considered over, a recent Private Industry Notification focused on the Healthcare industry indicates that organizations should remain vigilant.

87% of Organizations Rank Cyberattacks as the Number One Threat to Their Business

New data sheds a shocking light on just how inexperienced organizations are today in addressing cybersecurity needs – and the impact attacks are having on their business.

CyberheistNews Vol 12 #39 [HEADS UP] Bank of America Warns About Recent Scams That Request Zelle Payment Due to ‘Suspicious Activity’

Try the New Compliance Audit Readiness Assessment Today for the HIPAA Security Rule

When it’s time to complete a compliance audit of your cybersecurity readiness plan, are you thinking, “Ugh, is it that time again?”

Real Talk with CCSPs: An interview with Jonas Björk, CCSP

What is the true value of a cybersecurity certification? Many people may underestimate the depth of knowledge that is required to earn the designation of a certified security professional.  Along with that, many do not recognize the global reach of … Read More

Sentence in a Catphishing Case

A convict serving twenty-five years in South Carolina for voluntary manslaughter and attempted armed robbery, Darnell Kahn, has now also been convicted in a US court on Federal sextortion charges.

Recent Optus Data Breach Teaches the Importance of Recognizing Social Engineering

Optus, one of Australia’s largest telecommunications companies, recently suffered a data breach that affected over 9.8 million customers.

You Need Aggressive Cyber Training, Not “So, So” Training

According to nearly every study conducted over the last decade, social engineering is involved in the vast majority of cyber attacks. The figures range from about 30% to 90% of all hacking and malware attacks. There is no other root … Read More

“Browser-in-the-Browser” Phishing Technique Spotted in New Steam Account Attack

Luring victims using a realistic- and legitimate-looking fake browser window to steal Steam accounts, this new type of social engineering may be a sign of things to come.