Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Verizon: The Percentage of Users Clicking Phishing Emails is Still Rising

The long-awaited annual Verizon Data Breach Investigations Report is out, and it’s made very clear that users continue to be a problem in phishing attacks. I’ve said it before, if you only read one report each year, the Verizon Data Breach Investigations Report is one you shouldn’t miss. And this year’s report starts off with a topic close to our hearts here at KnowBe4: users engaging with phishing emails and clicking links.

Protecting Your Digital Footprint: The Dangers of Sharing Too Much on Social Media

For most folks, social media has become integral to their daily lives in today's hyperconnected world. They use platforms like Facebook, Twitter and Instagram to share their thoughts, experiences and personal moments with friends and family. Being online has even become a business for content creators, who share their insights and thoughts of their daily lives, from “Getting Ready With Me” (GRWM) to recording video trends of jumping over your camera to the beach or the latest dance craze.

Retrieval Augmented Generation (RAG): Unlocking the Power of Hybrid AI Models

Language models have revolutionized natural language processing, enabling machines to generate human-like text with remarkable fluency and coherence. However, despite their impressive capabilities, traditional language models often need help with knowledge-intensive tasks that require factual accuracy, external knowledge integration, and contextual awareness.

Securing medical devices: The role of fuzz testing in cybersecurity

In today's digital and interconnected era, the healthcare sector operates in a landscape of security risks. In 2023 alone, the number of vulnerabilities uncovered in medical devices jumped by 59% to 993 issues. Consequently, the U.S. Food and Drug Administration (FDA), the European Commission, and other governmental agencies have issued cybersecurity guidelines for medical devices. Many of these guidelines advocate for fuzz testing as a means of vulnerability detection.

How To Detect Compromised Identities with Teleport

Our customers use Teleport to solve a wide range of problems: They access their infrastructure remotely without passwords or shared secrets, and replace shared credentials in CI/CD systems and workloads with mTLS. They eliminate the need for VPNs and enable Just-In-Time Access to web apps, cloud consoles, databases, and more.

Detecting and Preventing Reconnaissance Attacks

In 2024, every business across the world is already aware of the looming potential of a cyber attack. With billions of dollars pouring into the cyber criminal market each year, hackers have more backing to create large-scale attacks, breaching financial records, private data, and customer information. Reconnaissance attacks are the first step in many of these major breaches. By scouting out a business, collecting information about its security posture, and aiming to identify vulnerabilities, these initial attacks give hackers the data they need to launch precise, damaging attacks.

Building Trust and Engagement: Mobile App Security for the Modern User

In today's fast-paced digital world, the focus is on creating secure and frictionless mobile applications that prioritize user privacy. This balance is particularly critical when dealing with in-app subscription management, a key revenue source and a hot spot for user data interaction. Proper management of these subscriptions is crucial for both securing continuous revenue and ensuring user trust alongside compliance with strict data protection standards.

Obrela Digital Universe Report Reveals Most Common Cyber Security Attacks, And Sectors Most Affected

Ransomware attacks increasingly targeting critical infrastructure, the financial sector, healthcare and educational institutions. Less-protected third-party partners with privileged access increasingly targeted.