Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

You Are Still Vulnerable to Password Attacks When Using Passkeys

Just because you’re using a passkey doesn’t mean your password is gone.
Continue Reading

Phishing Kits Are Growing More Sophisticated; Focused on Bypassing MFA

Researchers at Cisco Talos warn that major phishing kits continue to incorporate features that allow them to bypass multi-factor authentication (MFA).
Continue Reading

Talos Report: Phishing Attacks Surged in Q1 2025

Phishing was the initial access vector in 50% of attacks during the first quarter of 2025, according to a new report from Cisco Talos.
Continue Reading

Warning: Phishing Campaign Impersonates the US Social Security Administration

Researchers at Malwarebytes warn that phishing emails are impersonating the US Social Security Administration (SSA) to trick users into installing the ScreenConnect remote access tool.
Continue Reading

Your KnowBe4 Compliance Plus Fresh Content Updates from April 2025

Check out the April updates in Compliance Plus so you can stay on top of featured compliance training content.
Continue Reading

Your KnowBe4 Fresh Content Updates from April 2025

Check out the 21 new pieces of training content added in April, alongside the always fresh content update highlights, new features and events.
Continue Reading

Exciting Leadership Updates at KnowBe4

To our valued KnowBe4 customers, partners, and community. I wanted to share some exciting developments happening at KnowBe4.
Continue Reading

Xfinity Scam Might Explain Similar Scams

Recently, I covered a T-Mobile scam where a friend of mine narrowly avoided losing money. In that scam, the attackers called up pretending to be from T-Mobile offering him a ...
Continue Reading

Email Remains the Top Attack Vector for Cyberattacks

Email is still the most common attack vector for cyber threats, according to a new report from Barracuda.
Continue Reading

Hundreds of Fortune 500 companies have hired North Korean operatives.

Cyberwire wrote: "WIRED has published a report on North Korea's efforts to obtain remote IT positions at foreign companies, noting that these fraudulent workers are now using AI tools to ...
Continue Reading

Cybercriminals Impersonate DHS Amid Deportation Efforts

Researchers at INKY warn that criminals are impersonating the US Department of Homeland Security to launch phishing scams.
Continue Reading

A Sneaky T-Mobile Scam and Lessons That Were Learned

A friend of mine got a call on his phone and he regrettably picked it up. The number was 267-332-3644. The area code is from Bucks County, PA, where he used to live many years ago.
Continue Reading

Researchers Warn of Surge in Infostealers Delivered Via Phishing

The number of infostealers delivered via phishing emails increased by 84% last year, according to a new report from IBM’s X-Force researchers. Threat actors are using these malware ...
Continue Reading

What Is Device Code Phishing?

Ever since Microsoft’s initial announcement on February 13, 2025, about a Russian nation-state phishing campaign using "device code phishing," many people have been wondering what it is. ...
Continue Reading

Criminals Exploit the Death of Pope Francis to Launch Scams

Scammers are exploiting the death of Pope Francis to launch social engineering attacks, according to researchers at Check Point.
Continue Reading

AJ from The Inside Man Now Coaching Your Users Real-time with Security Coach

Do your users love The Inside Man? See more of beloved character AJ, now in SecurityCoach!
Continue Reading

Introducing the KnowBe4 Academy: Your Path to Mastering Human Risk Management

We're thrilled to announce the launch of KnowBe4 Academy—a comprehensive learning ecosystem designed specifically for security administrators, IT professionals and team members who manage ...
Continue Reading

Social Engineering Campaign Abuses Zoom to Install Malware

A social engineering campaign is abusing Zoom's remote control feature to take control of victims’ computers and install malware, according to researchers at security firm Trail of Bits.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews

OSZAR »