blog-logo.png

A BLOG ABOUT CYBER SECURITY

Wombat Security is a leader in security awareness and training. Our blog covers the latest cyber security news, insights, and best practices. We arm infosec professionals with the knowledge and tools they need to improve end-user behaviors and reduce organizational risk.

Phishing

2017 Beyond the Phish Report Reveals End-User Strengths, Weaknesses

Posted by Gretel Egan on Sep 21, 2017 10:07:41 AM

Infosec professionals who are seeking industry- and category-specific data points that illustrate business implications and highlight knowledge deficiencies in end-user cybersecurity knowledge, take note: our 2017 Beyond the Phish Report™ is now available for download.

Read More »

The Latest in Phishing: September 2017

Posted by Kym Harper on Sep 8, 2017 11:12:57 AM

We bring you the latest in phishing statistics and attacks from the wild.

Read More »

WannaCry, NotPetya, and the Evolution of Ransomware

Posted by Kurt Wescoe on Aug 9, 2017 1:12:25 PM

In the past few months, we’ve seen what will likely mark a pivot point in the evolution of ransomware and how it’s being deployed.

Read More »

Black Hat 2017 Takeaways: Treating the Root of End-User Risk

Posted by Kurt Wescoe on Aug 1, 2017 9:49:12 AM

Last week, I got to spend time with many other members of the security community at Black Hat USA 2017. Despite being in the infosec space for the past ten years, this was my first time attending the event, and I was impressed with the breadth of topics covered. None too surprising, I found a lot of interesting talks in the “Human Factors” track, but it was refreshing to see how broadly this community is looking at security.

Read More »

Business Email Compromise: Prevent Wire Transfer Fraud & W-2 Phishing

Posted by Gretel Egan on Jul 27, 2017 8:26:00 AM

Though business email compromise (BEC) phishing attacks continue to plague organizations worldwide, many end users still don't fully appreciate the danger. Employees are not aware of how sophisticated these targeted social engineering attacks can be, the very real threat they pose to their personal reputations, and the impact they can have on their organizations. 

Read More »