[EYE OPENER] Beyond Analysts: The Undeniable Leadership We Have in HRM
Color me surprised. I started KnowBe4 in 2010, and helped create a whole new category. Analyst reports aim to provide market insights. But when it comes to Human Risk Management (HRM), we've noticed that they often fall short of capturing the full picture.
You already know that we are the undisputed leader in the essential areas that have been standard features in the security awareness market for years. Those capabilities are why we've become the largest vendor in the space. But for years now we have exceeded just those standard features.
We wrote a blog post that I strongly recommend with a few examples why KnowBe4 stands out as the clear leader in the HRM space — and why it matters for your organization.
It's a 3-minute read, and you will walk out with powerful ammo to buy or renew your subscription. You might even experience some surprise yourself. :-D
Blog post with links: https://blog.knowbe4.com/beyond-analyst-reports-knowbe4s-undeniable-leadership-hrm
[New Features] Ridiculously Easy and Effective Security Awareness Training and Phishing
Old-school security awareness training (SAT) does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.
Join us Wednesday, October 2, @ 2:00 PM (ET), for a live demonstration of how KnowBe4 introduces a new-school approach to SAT and simulated phishing that is effective in changing user behavior.
Get a look at THREE NEW FEATURES and see how easy it is to train and phish your users.
Find out how nearly 70,000 organizations have mobilized their end users as their human firewall.
Date/Time: Wednesday, October 2, @ 2:00 PM (ET)
New Ransomware Threat Group, RansomHub, is so Effective, the NSA is Already Warning You About Them
The latest evolution of the ransomware service model, RansomHub, has only been around since February of this year, but its affiliates are already successfully exfiltrating data.
You know you're a problem when the U.S. government puts out a notice about you. That's the case for RansomHub — the latest iteration of a ransomware as a service group formerly working under the names Cyclops and Knight.
It appears that their latest service model is pulling ransomware affiliate actors away from big names in the ransomware world like LockBit and ALPHV.
According to the CISA/NSA cybersecurity advisory, the group and its affiliates have successfully exfiltrated data from over 210 organizations since February of this year across a wide range of industries that include "water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services, commercial facilities, critical manufacturing, transportation, and communications critical infrastructure."
In addition to a longer list of mitigations at the end of the advisory, the NSA make a few summary recommendations at the beginning to help organizations focus in on some of the most effective ways to stop ransomware:
KnowBe4 empowers your workforce to make smarter security decisions every day. Over 70,000 organizations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.
Blog post with kinks: https://blog.knowbe4.com/new-ransomware-threat-group-ransomhub-is-so-effective-the-nsa-is-already-warning-you-about-them
[Free Phish Alert Button] Give Your Employees a Safe Way to Report Phishing Attacks with One Click!
Phishing attacks are increasing in sophistication, posing a severe threat to organizations.
Users need a consistent process for reporting these emails, and InfoSec teams need one platform to manage the influx of reported emails.
KnowBe4's Phish Alert Button (PAB) provides your users a safe way to report email threats to the security team for analysis, and automatically deletes the email from the user's inbox to prevent further exposure.
Phish Alert Button Benefits:
KnowBe4's PAB works across most Outlook and Google workspaces. Outlook users should leverage our new Microsoft Ribbon PAB for a frictionless experience!
Get your Phish Alert Button Now: https://info.knowbe4.com/free-phish-alert-chn
North Korean Hackers Target Software Developers With Phony Coding Tests
Researchers at ReversingLabs warn that North Korea's Lazarus Group is targeting software developers with phony job interviews.
The threat actors are posing as employees of major financial services firms and send coding assessment tests as part of the interview process. Our team recently recorded a webinar that covers this exact topic, as our cybersecurity experts discuss how we spotted the red flags and stopped it before any damage was done.
The coding tests are designed to trick the job applicant into installing malware concealed in Python packages.
"The content of nearly identical README files included with the packages provides more insight into what the victim encountered," ReversingLabs says.
"They contain instructions for the job candidates to find and fix a bug in a password manager application, republishing their fix and taking screenshots to document their coding work. The README files tell would-be candidates to make sure the project is running successfully on their system before making modifications. That instruction is intended to make sure that the malware execution is triggered regardless of whether the job candidate (aka ‘the target') completes the assigned coding assignment."
The threat actors attempt to instill a sense of urgency by setting a short deadline for the assignment. This is a common social engineering tactic that makes the victim less likely to slow down and think rationally before acting.
"Specifically, the instructions set a timeframe for completing the assignment (finding a coding flaw in the package and fixing it)," the researchers write.
"It is clearly intended to create a sense of urgency for the would-be job seeker, thus making it more likely that he or she would execute the package without performing any type of security or even source code review first. That ensures the malicious actors behind this campaign that the embedded malware would be executed on the developer's system."
Blog post with links: https://blog.knowbe4.com/north-korean-hackers-target-software-developers-with-phony-coding-tests
[NEW WHITEPAPER] 9 Cognitive Biases Hackers Exploit the Most
Hackers have become increasingly savvy at launching specialized attacks that target your users by tapping into their fears, hopes and biases to get access to their data.
Cybersecurity is not just a technological challenge, but increasingly a social and behavioral one. People, no matter their tech savviness, are often duped by social engineer scams, like CEO fraud, because of their familiarity and immediacy factors.
Bad actors know how to tap into specific mental patterns we all have called cognitive biases to trick users into compromising sensitive information or systems.
In this whitepaper, explore how a better understanding of how hackers are duping users can help you identify potential cognitive biases, deliver training that actually changes behaviors and cut down on security incidents.
Read this whitepaper to learn:
Download this whitepaper today! https://info.knowbe4.com/wp-nine-cognitive-biases-hackers-exploit-most-chn
Scary New Windows PowerShell Phish
This is actually really slick, hats off to the person that came up with this. Reminds me of the old online game "hack" of getting someone to drop their equipment and hit ALT-F4, booting them out of the game and letting others steal their stuff. In AOL back in the day if you couldn't get someone to Alt F4 you could sometimes get them to Alt+S+S which didn't kill the app but it did sign them out, with their loot to pick up.
Check out how this works with Windows PowerShell today:
Brian Krebs has the story: https://krebsonsecurity.com/2024/09/this-windows-powershell-phish-has-scary-potential/
What You Are Worried About Regarding AI
I just ran a super short survey that asks about any AI tools you use or would like, how you feel about AI effectiveness, how it may change your headcount, and how confident you are to address AI-related security risks.
The most important thing I wanted to know is your biggest concerns about AI in cybersecurity in your own words. This is what you told me!
"My biggest concerns about AI in cybersecurity are AI-generated phishing, deepfakes, and automated attacks that make threats look real, making it harder for me and my team to detect them. I also worry that AI has become a tool for bad actors, the potential for data leakage, and if AI can protect our network quickly enough."
Job Titles of the people answering: Management/Leadership 30.4% Information Security 21.6% Technical/Engineering 19.2% IT Support/Administration 12.8% Compliance/Risk Management 6.4% Other roles: 11.2%
领英推荐
Here is what KnowBe4 is doing with AI to fight malicious use of AI by bad actors.
You can test the first four released Agents in KnowBe4's community today: https://blog.knowbe4.com/i-am-announcing-aida-artificial-intelligence-defense-agents
KnowBe4 Flagship Season Is Officially Here!
We are super excited to announce the release of the first two of the 2025 flagship modules:
Go check them out in your KnowBe4 ModStore!
Some Hot Links This Week:
Let's stay safe out there.
Warm Regards,
Stu Sjouwerman, SACP
Founder and CEO
KnowBe4, Inc.
"Opportunities to find deeper powers within ourselves come when life seems most challenging." - Joseph Campbell - Author (1904 - 1987)
"We can easily forgive a child who is afraid of the dark; the real tragedy of life is when men are afraid of the light." - Plato - Philosopher (427 - 347 B.C.)
Thanks for reading CyberheistNews
You can read CyberheistNews online at our Blog https://blog.knowbe4.com/cyberheistnews-vol-14-39-eye-opener-beyond-analysts-the-undeniable-leadership-we-have-in-hrm
U.S. Government Indicts Chinese National for Alleged Spear Phishing Attacks
The U.S. Justice Department has indicted a Chinese national, Song Wu, for allegedly sending spear-phishing emails to employees at various US military and government entities, as well as research institutions and private companies.
"In executing the scheme, Song allegedly sent spearphishing emails to individuals employed in positions with the U.S. government, including NASA, the Air Force, Navy, and Army, and the Federal Aviation Administration," the Justice Department says.
"Song also sent spear phishing emails to individuals employed in positions with major research universities in Georgia, Michigan, Massachusetts, Pennsylvania, Indiana, and Ohio, and with private sector companies that work in the aerospace field."
The Justice Department says Song was an employee of the Aviation Industry Corporation of China (AVIC), a Chinese state-owned aerospace and defense conglomerate. The goal of the alleged operation was presumably cyberespionage.
"Song allegedly engaged in a multi-year ‘spear phishing' email campaign in which he created email accounts to impersonate U.S.-based researchers and engineers and then used those imposter accounts to obtain specialized restricted or proprietary software used for aerospace engineering and computational fluid dynamics," the DOJ says.
"This specialized software could be used for industrial and military apps, such as development of advanced tactical missiles and aerodynamic design and assessment of weapons."
The phishing emails impersonated real colleagues of the targeted individuals, requesting access to source code.
"Song's spear phishing emails appeared to the targeted victims as having been sent by a colleague, associate, friend, or other person in the research or engineering community," the indictment says. "His emails requested that the targeted victim send or make available source code or software to which Song believed the targeted victim had access."
KnowBe4 empowers your workforce to make smarter security decisions every day. Over 70,000 organizations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.
The U.S. Justice Department has the story: https://www.justice.gov/opa/pr/justice-department-announces-three-cases-tied-disruptive-technology-strike-force
Phishing Attacks Increasingly Target Mobile Devices
Lookout has published its threat report for the second quarter of 2024, finding a significant rise in phishing attacks targeting mobile devices. Many of these attacks are designed to trick users into handing over their credentials, granting attackers access to corporate accounts.
"Mobile phishing and malicious content have exploded in popularity as attackers evolve their tactics to target enterprise credentials," the researchers write. "This has led to a fundamental shift in the traditional cyber killchain, and this modern killchain is dependent on using legitimate credentials as a way to quietly enter corporate infrastructure and compromise data.
"Attackers take on convincing personas as internal IT or security teams to trick employees into sharing or supposedly resetting their passwords. More recently, actors have taken to impersonating executives and contacting new or existing employees to get them to share sensitive company data in a high pressure situation."
The researchers note that mobile phishing attacks can take place through any app that allows users to message each other, and these messages can often evade security filters.
"Mobile phishing is a pervasive threat that attackers can use across any app that has messaging functionality," the researchers write. "This doesn't just mean email, SMS, iMessage, WhatsApp, Telegram and the like, but also social media apps like Instagram and TikTok, the LinkedIn mobile app, mobile games, and even dating apps.
"Even if an organization manages the apps its employees can use, Lookout data shows that those employees are just as likely to encounter a phishing attack as organizations who don't manage apps."
New-school security awareness training gives your organization an essential layer of defense against social engineering attacks.
Lookout has the story: https://www.lookout.com/threat-intelligence/report/q2-2024-mobile-landscape-threat-report
"Hiya Stu, thanks for your email. Yes we are happy with your service.
As I'm sure you are aware, there are limitations with the MS offering, and KnowBe4 makes the process of building the simulated phishing emails, and the reporting much easier. We are able to spend time doing more frequent campaigns, rather than working with MS tools.
Getting the tight integration between the Phish Alert Button and Outlook (both web version, and desktop version) is something that we are keen to see, so I hope the dev work you are doing in this area continues."
- J.P, Information Security Analyst
"Thanks for checking in, Stu. We were just talking today about how we can buy all the tech and software in the world but if our own people give up information, we're toast.
KnowB4 has been working great so far!
Just had my quarterly meeting with Laura S. and am thankful that she is our main contact for KB4. She is professional, quick to assist, and I appreciate her willingness to share best practices and next steps for our school district. Definitely a happy camper!"
- H.E., Chief Technology Officer
This Week's Links We Like, Tips, Hints and Fun Stuff