Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Scanning for Trouble: Behind the Scenes of Our QR Code Phishing Demo

At KnowBe4, we constantly strive to stay ahead of emerging threats and create training content to warn users about the latest tactics used by cybercriminals. One of the ways we do this is through our internally produced demo video productions, which used to star the incredible Kevin Mitnick and his legendary hacking demos. In these modules we showcase real-world attack scenarios and provide actionable insights on how to defend against them. Last year my colleague Dr.

Protect Your Data: Russian Spear-Phishing Targets Microsoft 365 Accounts

Several Russian threat actors, including the SVR’s Cozy Bear, are launching highly targeted spear phishing attacks against Microsoft 365 accounts, according to researchers at Volexity. The attackers are impersonating employees at the US State Department, the Ukrainian Ministry of Defence, the European Union Parliament, and well-known research institutions.

The Advantage of Using VEX SBOMs

Software Bills of Material (SBOMs) are documents which contain a list of components and dependencies of a given software ecosystem, like a list of ingredients in a recipe. On its own, an SBOM can provide some context to how the application was created, what kinds of functionality it may contain, as well as provide a glimpse into the lifecycle of the software project.

Security Bulletin: Rha-Rha-Rhadamanthys Information Stealer

The origin of the word “Rhadamanthys”, goes back to Greek mythology where he was a legendary figure who ruled as king of Crete. Born to Zeus and Europa, he held the status of demigod and was renowned for his wisdom. Rhadamanthys Stealer is a sophisticated information stealer written in C++ that employs multiple evasion techniques. The malware utilizes a custom packer for code obfuscation and incorporates anti-VM and anti-debugging mechanisms to prevent analysis.

Token-Based Authentication: Types, Importance, and Best Practices

As technologies continue to advance, it is crucial to have secure and stable mechanisms for authentication to protect essential data from malicious access. Token-based authentication is a technique that has proven effective in curbing security threats, chiefly because it is easy and secure. Here, we present a great-length tutorial before discussing token-based authentication, which comprises its types, how it works, why it is crucial, its advantages, techniques, and applications.

The Ultimate Guide to Sigma Rules

In cybersecurity as in sports, teamwork makes the dream work. In a world where security analysts can feel constantly bombarded by threat actors, banding together to share information and strategies is increasingly important. Over the last few years, security operations center (SOC) analysts started sharing open source Sigma rules to create and share detections that help them level the playing field.

Revolutionizing Privileged Access Management With KeeperPAM

According to the 2024 Verizon Data Breach Investigations Report, 75% of cyber attacks involve exploiting compromised privileged credentials, making privileged access one of the most sought-after attack vectors. Additionally, 60% of organizations cite insider threats as the primary cause of data breaches, highlighting the critical need to secure privileged accounts against both external and internal threats.

Best YouTube Channels for Crypto Trading: Top Picks for Beginners and Advanced Traders

When I first ventured into crypto trading, finding the right resources felt overwhelming. But YouTube quickly became my go-to platform for learning. The best part? It's packed with creators who simplify complex strategies and share real insights into market trends. These channels helped me build confidence and make informed decisions in an ever-changing market.

What is On-Chain Analysis in Crypto Trading? A Guide to Smarter Investment Strategies

When I first discovered on-chain analysis in crypto trading, it felt like unlocking a whole new level of insight. It's incredible how much valuable information is available directly from blockchain data, offering a transparent view of transactions, wallet activities, and market trends. For anyone serious about crypto trading, this approach can be a real game-changer.

How to Set Up Proactive Threat Intelligence

What is the best way to avoid suffering multi-million-dollar security incidents? Know your cyber enemy in advance. This means having quality threat intelligence on all the threats targeting your business, industry, or country. Let's take a look at one of the most effective methods of collecting intel that your organization can use to better predict, detect, and respond to cyber attacks.