Less Than 3 Percent of ‘Collection #1’ Data Dump Passwords are Unique

Less Than 3 Percent of ‘Collection #1’ Data Dump Passwords are Unique

This month the largest recorded data dump in history, 87GB filled with passwords and user credentials, was made available. Dubbed Collection #1 consists of 1,160,253,228 unique combinations of email addresses and passwords. Though historic, there are two positive notes regarding this information: The first is that this data set was ... Read More
Social Risk Monitoring: All Press Good Press?

Social Risk Monitoring: All Press Good Press?

It happens on a daily basis, it’s even likely that at some point it happened to you: social media account takeovers. A quick Google search shows a new batch of celebrities, politicians, companies, and other high profile users becoming the victim of account takeovers on a weekly basis ... Read More
49 Percent of Phishing Sites Now Use HTTPS

49 Percent of Phishing Sites Now Use HTTPS

| | HTTPS
Since 2015 there has been a steady increase in threat actors’ use of SSL certificates to add an air of legitimacy to malicious websites. By the end of 2017 almost a third of phishing sites had SSL certificates, meaning their URLs began with HTTPS:// and (most) browsers displayed the all-important ... Read More
Users Failing Phishing Simulations? That’s ok

Users Failing Phishing Simulations? That’s ok

Phishing simulations come with a range of emotions for the users who interact with them. Some will simply ignore them, others may fail by clicking on a link or attachment, and for the well-trained, they may even report them. Even if there is a negative outcome, training leads and organizations ... Read More
Is it a Phish: Halloween Edition

Is it a Phish? Halloween Edition

| | Is it a phish?
To wrap up our Cyber Security Awareness Month activities we’re bringing back a crowd favorite, Is it a Phish? And since it’s Halloween, we, of course, had to find the scariest, most terrifying phishing examples we could drum up for our very special guest, T Rex ... Read More
Meet the Cyber Security Awareness Team: Dane

Meet the Cyber Security Awareness Team: Dane

In our ongoing contributions to Cyber Security Awareness Month today we’re launching a two-part series designed to introduce you to some of our team. For those who have been fortunate (unfortunate) enough to be on the receiving end of one of our phishing simulations, interacted with our microlearning modules, or ... Read More
Meet the Cyber Security Awareness Team: Kimber

Meet the Cyber Security Awareness Team: Kimber

In our ongoing contributions to Cyber Security Awareness Month today we’re launching a two-part series designed to introduce you to some of our team. For those who have been fortunate (unfortunate) enough to be on the receiving end of one of our phishing simulations, interacted with our microlearning modules, or ... Read More
15 Years of Cybersecurity Awareness Month

15 Years of Cybersecurity Awareness Month

https://info.phishlabs.com/what_is_the_cost_of_a_phishing_attack_phishing_susceptibility_modelEach year in the month of October there are more things to be cognizant of than ghosts and ghouls, in fact something far scarier. That’s right, Cyber Security Awareness month is back, and with it our team is bringing you some new and updated resources ... Read More
Targeting the Brand: Your C-Suite May Be at Risk

Targeting the Brand: Your C-Suite May Be at Risk

Social media is impacting the world around us. Most organizations have social media accounts, cloud-based drives, access cloud platforms, are filled with employees who use messengers like Slack, and tap into any other piece of the ever expanding digital world. Because of the growth rate of each of these types ... Read More
Defining and Managing Success for Security Teams

Defining and Managing Success for Security Teams

Big or small, global or local, almost every organization uses some form of technology, and therefore has security needs within it. Due to the nature of the work and variables in play, metrics and success are often a subjective matter from organization to organization ... Read More
Loading...