Technology shapes the way we interact with each other. More people than ever are working from home and utilizing mobile phones, laptops, and other devices...
RCE. These three letters add increased levels of stress to cybersecurity professionals regarding vulnerabilities against their hardware or software within their risk management program. originally...
During the period the world has dubbed “the great resignation”, phishing scammers are shifting tactics to take advantage of those looking for a new career...
New advisory sees critical infrastructure once again in the crosshairs and makes critical recommendations to both protect against ransomware and to reduce its’ impact. originally...
Check out the 28 new pieces of training content added in February, alongside the always fresh content update highlights and new features. originally published onhttps://blog.knowbe4.com/your-knowbe4-fresh-content-updates-from-february-2022...
A real US Army colonel named Daniel Blackmon is being impersonated in hundreds or even thousands of romance scams, according to Haley Britzky at Task...
Everybody uses LinkedIn. Everybody. I mean, at last count the site had 722 million subscribers. That’s what makes the site so incredibly useful for networking,...
Secureworks® Counter Threat Unit™ (CTU) researchers investigated a Computer Emergency Response Team of Ukraine (CERT-UA) warning of phishing activity posted to Facebook on February 25,...