Today’s hackers are concealing their attacks in places you wouldn’t expect… utilizing tools your users know and trust to deliver their malicious payloads. From hijacked...
Researchers at Egress observed a massive increase in phishing kits in the run-up to Black Friday, particularly those impersonating Amazon. originally published onhttps://blog.knowbe4.com/holiday-shopping-and-phishing-as-a-service...
I recently brought together three recognized practice leaders in cybersecurity—Security Curve CTO and Founding Partner Diana Kelley, Berkeley Varitronics President and CEO Scott Schober, and...
This elaborate scam uses social engineering to trick victims into sending the hacker Bitcoin while holding Instagram accounts hostage. originally published onhttps://blog.knowbe4.com/bitcoin-scam-videos-on-instagram-are-part-of-an-elaborate-account-takeover-scam...
The need for increased mobile security in the Energy sector has become evident with new data highlighting why these phishing attacks are occurring and effective...
Cloud is instrumental to digital transformation. Companies use cloud to rapidly roll out innovative digital products and services, modernize IT environments, and support hybrid working....
The Secureworks® Adversary Group (SwAG) is a team of world-class ethical hackers that uses goal-based penetration testing to pinpoint vulnerabilities in customer environments. We use...
Secureworks® recently held its virtual 2021 Global Threat Intelligence Summit. The event featured a dozen sessions led by our Counter Threat Unit™ (CTU™) on a...
When developing information security strategies, business continuity plans, and disaster recovery plans, organizations should answer the following questions: What applications, data, and information systems are...