Between May 5 and May 7, 2025, KnowBe4 Threat Lab identified a phishing campaign originating from accounts created on the legitimate service ‘EUSurvey’.| blog.knowbe4.com
Social engineering attacks are a growing threat to operational technology (OT) environments, Industrial Cyber reports.| blog.knowbe4.com
KnowBe4's blog keeps you informed about the latest in security including social engineering, ransomware and phishing attacks.| blog.knowbe4.com
CyberheistNews Vol 15 #32 How Hackers Exploit Microsoft Teams in Social Engineering Attacks| blog.knowbe4.com
As I reflect on KnowBe4's incredible journey, I'm filled with both pride for how far we've come and excitement for what’s ahead. Today marks a special...| blog.knowbe4.com
Check out the 36 new pieces of training content added in July, alongside the always fresh content update highlights, new features and events.| blog.knowbe4.com
Check out the July updates in Compliance Plus so you can stay on top of featured compliance training content!| blog.knowbe4.com
The FBI has issued an advisory warning that scammers are distributing QR code phishing (quishing) links via unsolicited packages sent by snail mail.| blog.knowbe4.com
I hear about a ton of similar-sounding scam calls, where the scammer is pretending to be from a service you use (or used), offering you a substantial...| blog.knowbe4.com
Cybersecurity incidents nearly tripled in the first half of 2025, jumping from 6% in the second half of 2024 to 17% in 2025, according to a new report....| blog.knowbe4.com
In today's world, cyberattacks are a constant threat.| blog.knowbe4.com
A phishing campaign is targeting Instagram users with phony notifications about failed login attempts, according to researchers at Malwarebytes.| blog.knowbe4.com
ClickFix attacks have been around for decades; only the name is new.| blog.knowbe4.com
We observed a 98% rise in phishing campaigns hosted on Russian (.ru) top-level domains (TLDs) from December 2024 to January 2025, primarily used for credential harvesting...| blog.knowbe4.com
Digital connectivity is reshaping European manufacturing, driving both efficiency and innovation.| blog.knowbe4.com
When it comes to cybersecurity, organizations face an ever-present and often underestimated threat: human risk...| blog.knowbe4.com
Cybersecurity has long focused on fortifying networks, securing endpoints and blocking malicious code...| blog.knowbe4.com
Last year, KnowBe4's report Exponential Growth in Cyber Attacks Against Higher Education Institutions illustrated the growing cyber threats facing...| blog.knowbe4.com
According to a recent survey, 96% of executives failed to tell the difference between a real email and a phishing email 100% of the time.| blog.knowbe4.com
In today's cybersecurity landscape, organizations face an ever-present and often underestimated threat: human risk.| blog.knowbe4.com
When it comes to artificial intelligence (AI) and human risk management (HRM), not all AI is created equal.| blog.knowbe4.com
On March 3, 2025, the KnowBe4 Threat Labs team observed a massive influx of phishing attacks originating from legitimate Microsoft domains.| blog.knowbe4.com
Much like sending a phishing email from a compromised account, cybercriminals can boost the deliverability and credibility of their attacks by leveraging...| blog.knowbe4.com
ESET has published its Threat Report for the second half of 2024, outlining a new social engineering tactic targeting mobile banking users...| blog.knowbe4.com
North Korean IT Worker Threat: 10 Critical Updates to Your Hiring Process| blog.knowbe4.com
The US FBI warns that scammers are attempting to trick law firms into transferring money as part of a phony debt collection scheme...| blog.knowbe4.com
Meet SmartRisk Agent™: Unlock Your New Human Risk Management| blog.knowbe4.com
How a North Korean Fake IT Worker Tried to Infiltrate Us| blog.knowbe4.com
2022 marks the 5th year KnowBe4 has analyzed hundreds of millions of elements of data in order to provide the 2022 Phishing by Industry Benchmark Report.| blog.knowbe4.com
Human error is still very much the driving force behind an overwhelming majority of cybersecurity problems.| blog.knowbe4.com