News
Your KnowBe4 Fresh Content Updates from January 2026
1+ hour, 13+ min ago (261+ words) Useful information, not only for work but for personal purposes. I will definitely pass what I've learned on to family and friends!Very good reminders; I've experienced some of these situations recently. Training ModuleCheck out our updated version of our…...
New Malware Kit Promises Guaranteed Publication in the Chrome Web Store
4+ hour, 10+ min ago (261+ words) A new malware-as-a-service (MaaS) kit called "Stanley" is offering users guaranteed publication in the Chrome Web Store, bypassing Google's security verification process, according to researchers at Varonis. "For $2,000 to $6,000, Stanley provides a turnkey website-spoofing operation disguised as a Chrome extension,…...
Attackers Can Use LLMs to Generate Phishing Pages in Real Time
17+ hour, 43+ min ago (406+ words) Researchers at Palo Alto Networks" Unit 42 warn of a proof-of-concept (PoC) attack technique in which threat actors could use AI tools to generate malicious JavaScript in real time on seemingly innocuous webpages. "Once loaded in the victim's browser, the initial…...
14.1 Million Reasons Your SEG and Email Security Tech is Failing
2+ day, 6+ hour ago (196+ words) In the relentless growth of the phishing landscape, technical advances like AI have made attack methods two-pronged. They target technical weaknesses and use identity-based attacks to bypass defenses that land directly in end user inboxes. If you are still relying…...
CyberheistNews Vol 16 #04 The Skeleton Key: How Attackers Weaponize Trusted RMM Tools for Backdoor Access
1+ week, 3+ day ago (1639+ words) The Skeleton Key: How Attackers Weaponize Trusted RMM Tools for Backdoor Access This is not a traditional virus attack. Instead of deploying custom viruses, attackers are bypassing security perimeters by weaponizing the necessary IT tools that administrators trust. By stealing…...
Preventing Data Breaches Before They Happen: Why Outbound Email Security Can't Be Ignored
2+ week, 1+ day ago (565+ words) While organizations invest heavily in stopping threats from entering their networks, a critical vulnerability often goes underprotected: sensitive data leaving the organization through email. Every day, employees send thousands of emails containing confidential information - patient records, financial data, legal documents,…...
Threat Actors Exploit Misconfigurations to Spoof Internal Emails
3+ week, 22+ hour ago (412+ words) Attackers are increasingly abusing network misconfigurations to send spoofed phishing emails, according to researchers at Microsoft. This technique isn't new, but Microsoft has observed a surge in these attacks since May 2025. "Phishing actors are exploiting complex routing scenarios and misconfigured…...
AI Deepfakes Are Impersonating Religious Figures to Solicit Donations
3+ week, 3+ day ago (286+ words) WIRED reports that deepfake attacks are impersonating pastors and other religious figures in order to scam congregations. Father Mike Schmitz, a priest who hosts a podcast with over a million followers, warned his listeners in November that AI-generated deepfakes were…...
Your KnowBe4 Fresh Compliance Plus Content Updates from December 2025
3+ week, 4+ day ago (269+ words) Gave me good things to consider that I had not thought about as we move forward and AI becomes a part of our work processes!" Sexual Harassment Prevention for Employees (California) Section 2Training ModuleSection two provides a deeper understanding of sexual…...
Your KnowBe4 Fresh Content Updates from December 2025
4+ week, 1+ hour ago (463+ words) It was really good. I liked that it covered a lot of important subjects, focused on how to spot red flags, and used an AI deepfake demonstration." Great content and information, especially on how AI is used to target and…...