Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Social Engineering Threats You Can't Ignore - And Why Most Are Inherently Mobile Problems

When most people think about cybersecurity, they picture firewalls, anti-virus software, and complex passwords. But the weakest link isn’t a server or a laptop—it’s a person. Social engineering attacks exploit human behavior rather than technical vulnerabilities, and four techniques dominate the landscape today: phishing, smishing, vishing, and quishing.

AI Data Privacy Concerns - Risks, Breaches, Issues in 2025

Data is moving faster than your controls. In 2024, AI privacy/security incidents jumped 56.4%, and 82% of breaches involve cloud systems; the same lanes your LLMs, agents, and RAG pipelines speed through every day. If you’re shipping GenAI inside a regulated org, you need guardrails that protect PII/PHI and IP without crushing context or tanking accuracy. Use this guide to.

Super Simple SOBR Migration: How to Move Your Veeam Capacity Tier to 11:11 Object Storage for Amazon S3

As you can tell I’m on a bit of a “migrate all the things” story arc here of late and today will be the latest installment. In my last post I covered using the VeeaMover capability to move backups between repositories or jobs but that is not an effective data migration mechanism if you’ve used the Capacity Tier “COPY” capability of a Veeam Scale Out Backup Repository (SOBR).

KeeperPAM Named Top-Rated Privileged Access Management Solution in 2025 EMA Report

Accounts with unnecessarily elevated – and standing – permissions to an organization’s critical infrastructure are prime targets for threat actors. This is the case for all industries, but especially organizations in the finance, healthcare and manufacturing industries. This heightened risk has made protecting privileged access a top priority for cybersecurity teams globally.

AI Data Privacy Concerns - Risks, Breaches, Issues in

Data is moving faster than your controls. In 2024, AI privacy/security incidents jumped 56.4%, and 82% of breaches involve cloud systems; the same lanes your LLMs, agents, and RAG pipelines speed through every day. If you’re shipping GenAI inside a regulated org, you need guardrails that protect PII/PHI and IP without crushing context or tanking accuracy. Use this guide to.

How To Achieve Endpoint Visibility for Enhanced Endpoint Security

Endpoint visibility is fundamental to many of the processes that underpin effective endpoint security: data collection, monitoring, alerting (including alert analysis), and comprehensive threat detection and response. Trouble is, the number, types, locations, and use cases of endpoints are constantly in flux, due to user comings and goings, role changes, broad use of virtual instances and cloud-based workloads, Internet of Things (IoT) proliferation, hybrid work, and numerous other factors.

Threat Actors Are Increasingly Abusing Generative AI Tools for Phishing

Cybercriminals are increasingly abusing AI-assisted website generators to quickly craft convincing phishing sites, according to researchers at Palo Alto Networks’ Unit 42. In many cases, even when these services have safeguards in place to prevent abuse, criminals are able to bypass these measures in order to create phishing pages. Unit 42 tested a popular website generator to see how easy it was to spin up a spoofed website.

The Technical Sophistication Behind the "Free" Gift Scam: Evading Detection

Below is an example of a sophisticated survey scam phishing email that KnowBe4’s Threat Lab team has been monitoring as discussed in “The Hidden Cost of "Free" Gifts: How Survey Scams Are Evolving to Steal Financial Data”. As discussed in our previous blog, the human element is a critical part of the fake survey scam. However, the campaign's success is largely due to its advanced technical infrastructure.

The Hidden Cost of "Free" Gifts: How Survey Scams Are Evolving to Steal Financial Data

You've probably seen them: enticing online offers for free products from brands you trust, like a Yeti beach chair from Costco or an emergency car kit from AAA. All you have to do is fill out a quick survey and pay a small "shipping fee" of a couple of dollars. But what seems like a harmless transaction is actually a sophisticated scam with a high price tag. The KnowBe4 Threat Lab team has been tracking a phishing campaign where scammers use these fake surveys to steal financial data.

State of third-party risk management: Expert insights and the path forward

In today’s fast-moving digital economy, growth depends on strong, trusted relationships with vendors, suppliers, and partners. These third parties are often essential to modern business operations; however, they also open the door to a range of risks, from regulatory fines to operational slowdowns. Many organizations have already felt the impact of these risks becoming reality firsthand.