Return-Path: <1921889-447-1022@be6.maropost.com>
Delivered-To: edward@transocean.com
Received: from vps.transocean.com
	by vps.transocean.com (Dovecot) with LMTP id 2Zi7KMEGdlnUFAAAInt2oQ
	for <edward@transocean.com>; Mon, 24 Jul 2017 07:40:01 -0700
Return-path: <1921889-447-1022@be6.maropost.com>
Envelope-to: edward@transocean.com
Delivery-date: Mon, 24 Jul 2017 07:40:01 -0700
Received: from mta7166.mp2200.com ([162.247.117.166]:48875)
	by vps.transocean.com with esmtp (Exim 4.89)
	(envelope-from <1921889-447-1022@be6.maropost.com>)
	id 1dZeWL-0001PF-R4
	for edward@transocean.com; Mon, 24 Jul 2017 07:40:01 -0700
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 s=default; d=knowbe4.com; t=1500907180; l=1; h=from:subject:date:to;
 bh=nR4OLZRZ0GUjrRPiikCTwjFrqv567Fsl8w66LhE1mcQ=;
 b=wegDAK4BEZ3JuafgzHI2XrPSep/RCIufrwINkwLM1+Lww62YPt+ouvbTJ3bWtbtzrcv0aK
 lsoHoYevsQ8Q6IfXCjH3uiofI/nQzedlfCfNOwUEdpeiXfLsWrEqj8+nrjYhLZRpg5XIng
 JfZBIlWP6eDre3/e9/OikR7+/Gc/FKA=
Received: from [<1921889-447-1022@be6.maropost.com>] ([<1921889-447-1022@be6.maropost.com>] helo=) 
 by 649893-mailer3 (envelope-from 1921889-447-1022@be6.maropost.com)
 (Jetsend MTA 0.0.1 with ESMTP; Mon Jul 24 10:17:08 EDT 2017
Date: Mon, 24 Jul 2017 10:17:05 -0400
From: CyberheistNews <feedback@knowbe4.com>
Reply-To: feedback@knowbe4.com
To: edward@transocean.com
Message-ID: <b1d99730-52a8-0135-225b-0cdcd4b634c4@knowbe4.com>
Subject: CEO Fraud Attacks Were Far More Lucrative Than Ransomware Over the
 Past 3 Years
Mime-Version: 1.0
Content-Type: multipart/alternative;
 boundary="--==_mimepart_59760161b8cae_5c2f363837085605382";
 charset=UTF-8
Content-Transfer-Encoding: 7bit
List-Unsubscribe: <mailto:1921889-447-1022-162.247.117.166-gmail@abuse.maropost.com>
X-CampaignID: 447
X-Campaign-ID: 447
X-ContactID: 1921889
X-AccountID: 1022
X-Binding: 162.247.117.166
X-DkimDomain: knowbe4.com
X-DkimSelector: default
X-Feedback-ID: 447:Maropost
X-Spam-Status: No, score=-2.0
X-Spam-Score: -19
X-Spam-Bar: --
X-Ham-Report: Spam detection software, running on the system "vps.transocean.com",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 
 Content preview:  If you are having trouble viewing this email, click here.
   http://newsletter.knowbe4.com/a/1022/preview/447/1921889/e93212e0ed3f8d76a204d97f70526983ea57886e
    This email was sent to &amp;lt;b&amp;gt;edward@transocean.com&amp;lt;/b&amp;gt;
    by &amp;lt;b&amp;gt;feedback@knowbe4.com&amp;lt;/b&amp;gt; Manage Subscriptions
    http://newsletter.knowbe4.com/a/1022/unsubscribe/447/1921889/e93212e0ed3f8d76a204d97f70526983ea57886e
    33 N Garden Ave, Suite 1200 Clearwater, FL 33755 USA Report Spam http://newsletter.knowbe4.com/a/1022/report_spam/447/1921889/e93212e0ed3f8d76a204d97f70526983ea57886e
    [...] 
 
 Content analysis details:   (-2.0 points, 3.0 required)
 
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was blocked.
                             See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: sandiegouniontribune.com]
  0.0 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail
                             domains are different
 -0.0 SPF_PASS               SPF: sender matches SPF record
  0.0 T_SPF_HELO_TEMPERROR   SPF: test of HELO record failed (temperror)
  0.0 T_KAM_HTML_FONT_INVALID BODY: Test for Invalidly Named or Formatted
                             Colors in HTML
 -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%
                             [score: 0.0019]
  0.0 HTML_MESSAGE           BODY: HTML included in message
 -0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
  0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily valid
 -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from author's
                             domain
  0.0 UNPARSEABLE_RELAY      Informational: message has unparseable relay lines
  0.0 T_FILL_THIS_FORM_SHORT Fill in a short form with personal information
X-Spam-Flag: NO


----==_mimepart_59760161b8cae_5c2f363837085605382
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

If you are having trouble viewing this email,
click here.
http://newsletter.knowbe4.com/a/1022/preview/447/1921889/e93212e0ed3f8d76a204d97f70526983ea57886e
This email was sent to &amp;lt;b&amp;gt;edward@transocean.com&amp;lt;/b&amp;gt; by &amp;lt;b&amp;gt;feedback@knowbe4.com&amp;lt;/b&amp;gt;
Manage Subscriptions
http://newsletter.knowbe4.com/a/1022/unsubscribe/447/1921889/e93212e0ed3f8d76a204d97f70526983ea57886e
33 N Garden Ave, Suite 1200 Clearwater, FL 33755 USA
Report Spam
http://newsletter.knowbe4.com/a/1022/report_spam/447/1921889/e93212e0ed3f8d76a204d97f70526983ea57886e


----==_mimepart_59760161b8cae_5c2f363837085605382
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: quoted-printable

  <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3=
.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
  <html xmlns=3D"http://www.w3.org/1999/xhtml">
    <head>
      <meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DU=
TF-8">
      <meta name=3D"viewport" content=3D"width=3Ddevice-width, initial-sc=
ale=3D1.0">
      <title>CEO Fraud Attacks Were Far More Lucrative Than Ransomware Ov=
er the Past 3 Years</title>
    </head>
    <body>
      <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http=
://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><table cellpadding=3D"0" cellspacing=3D"0" width=3D"100%">
<tr><td>
<img height=3D"1" width=3D"1" alt=3D"" style=3D"display:block;" src=3D"ht=
tp://newsletter.knowbe4.com/a/1022/open/447/1921889/e93212e0ed3f8d76a204d=
97f70526983ea57886e">
<div align=3D"center" style=3D'font-size:8.0pt; font-family:"Arial","sans=
-serif"; color:#666666;margin-bottom:10px;display:block !important'>
If you are having trouble viewing this email,
<a style=3D"border:0px" class=3D"maro_no_record" href=3D"http://newslette=
r.knowbe4.com/a/1022/preview/447/1921889/e93212e0ed3f8d76a204d97f70526983=
ea57886e?message_id=3DImIxZDk5NzMwLTUyYTgtMDEzNS0yMjViLTBjZGNkNGI2MzRjNEB=
rbm93YmU0LmNvbSI=3D">click here.</a>
</div>
</td></tr>
<tr><td>


<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF-8">=

<title></title>
<meta charset=3D"utf-8">
<meta name=3D"viewport" content=3D"width=3Ddevice-width, initial-scale=3D=
1">
<meta http-equiv=3D"X-UA-Compatible" content=3D"IE=3Dedge">
<link href=3D"https://fonts.googleapis.com/css?family=3DOpen+Sans:300,400=
,600,700,800" rel=3D"stylesheet">
<style type=3D"text/css">/* CLIENT-SPECIFIC STYLES */
    #outlook a{padding:0;} /* Force Outlook to provide a "view in browser=
" message */
    .ReadMsgBody{width:100%;} .ExternalClass{width:100%;} /* Force Hotmai=
l to display emails at full width */
    .ExternalClass, .ExternalClass p, .ExternalClass span, .ExternalClass=
 font, .ExternalClass td, .ExternalClass div {line-height: 100%;} /* Forc=
e Hotmail to display normal line spacing */
    body, table, td, a{-webkit-text-size-adjust:100%; -ms-text-size-adjus=
t:100%;} /* Prevent WebKit and Windows mobile changing default text sizes=
 */
    table, td{mso-table-lspace:0pt; mso-table-rspace:0pt;} /* Remove spac=
ing between tables in Outlook 2007 and up */
    img{-ms-interpolation-mode:bicubic;} /* Allow smoother rendering of r=
esized image in Internet Explorer */

    /* RESET STYLES */
    body{margin:0; padding:0; background-color:#ffffff;}
    img{border:0; height:auto; line-height:100%; outline:none; text-decor=
ation:none;}
    body{height:100% !important; margin:0; padding:0; width:100% !importa=
nt;}

    /* iOS BLUE LINKS */
    .appleBody a {color:#f16824; text-decoration: none;}
    .appleFooter a {color:#f16824; text-decoration: none;}

    /* MOBILE STYLES */
    @media screen and (max-width: 525px) {
</style>
<!--SUBJECT & DIRECT LINK-->


<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 20px 20px;=
">
<div style=3D"max-width:600px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:left; text-align:left; line-height:12px;"><span style=3D"font-size:10p=
x; line-height:10px; font-family: 'Open Sans', sans-serif; color:#676767;=
">CEO Fraud Attacks Were Far More Lucrative Than Ransomware Over the Past=
 3 Years<br>
=C2=A0</span></div>

<div style=3D"max-width:200px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:right; text-align:right; line-height:12px;"><span style=3D"font-size:1=
0px; line-height:10px; font-family: 'Open Sans', sans-serif; color:#67676=
7;">Email not displaying?<br>
<a href=3D"http://newsletter.knowbe4.com/a/1022/click/447/1921889/b0b95ee=
283cb9cc9fc41475b777a158c4a77b943/e93212e0ed3f8d76a204d97f70526983ea57886=
e" style=3D"color:#f16824; text-decoration:none;" target=3D"_blank">View =
Knowbe4 Blog</a></span></div>
</div>
<!--SUBJECT & DIRECT LINK--><!--LOGO-->

<div style=3D"max-width:800px; margin:auto; padding: 40px 20px 20px 20px;=
 text-align:center;"><a href=3D"http://newsletter.knowbe4.com/a/1022/clic=
k/447/1921889/044ac0b3da603dc543019ea4b8f92228baf8fbe8/e93212e0ed3f8d76a2=
04d97f70526983ea57886e" target=3D"_blank"><img align=3D"center" src=3D"ht=
tp://cdn2.hubspot.net/hubfs/241394/CHN-LOGO-2017-1.png" style=3D"width:10=
0%;"></a></div>
<!--/LOGO--><!--ISSUE & DATE-->

<div style=3D"max-width:800px; margin:auto; padding: 0px 20px 0px 20px; t=
ext-align:center;">
<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
<span style=3D"font-size:14px; line-height:14px; font-family: 'Open Sans'=
, sans-serif; color:#676767;">CyberheistNews Vol 7 #29 =C2=A0 | =C2=A0 Ju=
ly 24th., 2017</span>

<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
</div>
<!--/ISSUE & DATE--><!--MAIN STORY-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">CEO Fraud Attacks Were Far More Lucrative=
 Than Ransomware Over the Past 3 Years</span> <span style=3D"font-size:16=
px; line-height:22px; font-family: 'Open Sans', sans-serif; color: #33333=
3;"> <img align=3D"right" src=3D"http://cdn2.hubspot.net/hubfs/241394/CHN=
-STU-2017-1.png" style=3D" padding: 20px 0px 20px 20px;" width=3D"144"><b=
r>
<br>
Cisco's midyear report released this week showed that CEO fraud netted cy=
bercrime five times more money than ransomware over the last three years.=
<br>
<br>
The surprising highlight of Cisco's ninety-page report was that cybercrim=
e made 5.3 billion from CEO fraud attacks--called business email compromi=
se (BEC) by the FBI--compared with a "mere" 1 billion for ransomware over=
 a three-year stretch.<br>
<br>
Organized Eastern European cybercrime is more and more taking the "time i=
s money" approach, in this case billions, says Steve Martino, Cisco's chi=
ef information security officer. "What we are looking at is the continual=
 commercialization of cyberattacks," Martino says, pointing out that is a=
 major theme in the report.<br>
<br>
Ransomware takes time to develop and extensively test before any net Bitc=
oin comes into the wallet, compared to doing a quick bit of research on L=
inkedIn and crafting a spoofed spear-phishing attack. CEO fraud simply is=
 faster to pull off. Moreover, your run-of-the-mill spray-and-pray ransom=
ware attacks are often lower-dollar numbers.<br>
<br>
<b>Schooling Users on CEO Fraud and Ransomware</b><br>
<br>
Cisco's Martino says targeted cybersecurity education for employees can h=
elp prevent users from falling for CEO fraud and ransomware attacks. The =
finance department could especially benefit from security training on phi=
shing campaigns, so when the bogus email comes across the transit of the =
CEO asking for a funds transfer it can be detected, Martino says.<br>
<br>
Regular software patching also is crucial. When spam laden malware hits o=
r ransomware attacks similar to WannaCry surfaces, the impact can be mini=
mized. "People focus on new technology, but forget about patching and mai=
ntaining the infrastructure," Martino observed.<br>
<br>
And a balanced defensive and offensive posture, with not just firewalls a=
nd antivirus but also including measures to hunt down possible attacks th=
rough data collection and analysis, he adds.<br>
<br>
<b>Spyware Makes a Comeback</b><br>
<br>
Cisco found that in the first half of this year, attackers altered their =
methods of delivering, hiding, and evading their malicious packages and t=
echniques.<br>
<br>
Fileless malware is popping up, which lives in memory and disappears when=
 a device reboots, according to the report. As a result, it makes detecti=
on and the ability to investigate it more difficult.<br>
<br>
Additionally, attackers are also making use of anonymized and decentraliz=
ed infrastructures, such as Tor proxy services, to hide command and contr=
ol activities.<br>
<br>
Meanwhile, three families of spyware ran rampant, with Hola, RelevantKnow=
ledge, and DNSChanger/DNS Unlocker affecting more than 20% of the 300 com=
panies in the sample for the report.<br>
<br>
Ironically, many organizations underestimate or virtually dismiss spyware=
. "Spyware is being disguised as adware and adware, unlike spyware, does =
not create damages for a company," says Franc Artes, Cisco's Security Bus=
iness Group architect. He adds that attackers are injecting spyware and o=
ther forms of malware into adware, since adware is a low priority for sec=
urity teams.<br>
<br>
<b>=E2=80=98Destruction of Service=E2=80=99 Attack Threat</b><br>
<br>
The report also highlights the dangers of Destruction of Service (DeOS) a=
ttacks, epitomized by the likes of WannaCry and NotPetya which were both =
much more destructive than traditional ransomware. These types of attacks=
, Cisco says, have the strength to eliminate organizations=E2=80=99 data =
backups and leave them unable to recover.<br>
<br>
<b>Cost of Downtime Not Calculated</b><br>
<br>
The one thing that was not taken into account related to ransomware was t=
he amount of damage caused by downtime, having workstations and servers n=
ot up &amp; running. If you calculate that in, ransomware is probably as =
damaging as CEO fraud, or even more. </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">New Type of WhatsApp Phishing Attack</spa=
n><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">Heads-up. There is a new social engineerin=
g attack currently being tested in Europe, and that means we will see it =
in America in the near future.<br>
<br>
The bad guys are using malicious WhatsApp ads, which offer a 250 dollar c=
oupon for a well-known retailer, in exchange for a short survey. The invi=
te looks like it comes from a friend on WhatsApp. A similar strain instal=
ls a malware on the phone, which looks like a software update, but steals=
 all the contacts, phone numbers and email addresses - and if they can fi=
nd any, passwords and banking credentials.<br>
<br>
There are different ways to monetize all this phishing data, and it looks=
 like the bad guys have got that down too, from selling the stolen creden=
tials to using the malware to go viral to all the contacts on the phone.<=
br>
<br>
The large retailers have reported hundreds of these attacks to Europe's f=
ederal Cyber Crime Unit.<br>
<br>
Warn your users to not click on dodgy WhatsApp special coupon offers. </s=
pan>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">43% of C-Suite Execs Name Cybersecurity a=
s No. 1 Operational Challenge</span><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">A global survey over 400 C-suite execs by =
the management consulting firm A.T. Kearney showed that cybersecurity (43=
 percent) is the top operational challenge they faced.<br>
<br>
Also, a whopping 85 percent of C-suite executives agree that cyberattacks=
 will become more frequent and more costly. Here are five survey take-awa=
ys. Posted at the KnowBe4 Blog:<br>
https://blog.knowbe4.com/43-of-c-suite-execs-name-cybersecurity-as-no.-1-=
operational-challenge </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">Live Webinar: Top 5 Strategies to Prevent=
 Ransomware</span><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">It's been a "Ransomware Horror Show=E2=80=9D=
. If you've been in the IT trenches over the past year, you've probably n=
oticed that announcements of new ransomware strains are accelerating and =
there is no end in sight.<br>
<br>
Join us for this 30-minute live webinar =E2=80=9CTop 5 Strategies to Prev=
ent Ransomware=E2=80=9D, on Tuesday, July 25th at 2:00 pm EDT. Erich Kron=
, CISSP, Security Awareness Advocate at KnowBe4 will look at scary featur=
es of new ransomware strains and give you 5 strategies you can implement =
now to help you prevent ransomware.<br>
<br>
Erich will cover: </span>

<ul>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;">The new scary Ransomware trends out i=
n the wild</span></li>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;">How to eliminate or reduce damage fro=
m ransomware</span></li>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;">How to fortify your last line of defe=
nse=E2=80=94your end users</span></li>
</ul>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;"> <b>Date/Time: Tuesday, July 25, 2017, at =
2:00 pm EDT. Register Now: </b><br>
https://attendee.gotowebinar.com/register/2525090409700004353 </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">Black Hat USA 2017: Know Before You Go</s=
pan><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">1) DarkReading has a very handy article wr=
itten by Black Hat Staff, with important event information, including bad=
ge pick-up hours, scheduling updates, special programs, and more.<br>
<br>
Make sure to follow @BlackHatEvents on Twitter and tweet using the hashta=
gs #BHUSA and #BlackHat to join the conversation and stay up-to-date. Dow=
nload the official Black Hat USA mobile app to customize your event sched=
ule<br>
http://www.darkreading.com/black-hat/black-hat-usa-2017---know-before-you=
-go/d/d-id/1329420<br>
<br>
2) While you are there, stop by KnowBe4=E2=80=99s Booth #1848 for Kevin M=
itnick=E2=80=99s Book Signing. Meet the =E2=80=98World=E2=80=99s Most Fam=
ous Hacker=E2=80=99 and get a signed copy of his new book: Wednesday, Jul=
y 26, 5-7pm at KnowBe4=E2=80=99s Booth 1848 while they last.<br>
<br>
3) What to expect at Black Hat: Security hype and reality. Look for machi=
ne learning, automation, orchestration, integration and threat intelligen=
ce to dominate the Black Hat security conference:<br>
http://www.csoonline.com/article/3209972/security/anticipating-black-hat-=
hype-and-reality.html#tk.twt_cso </span>

<p align=3D"right"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color: #333333;">Warm Regards,<br>
Stu Sjouwerman<br>
Founder and CEO<br>
KnowBe4, Inc.</span></p>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;"> </span>
</div>
<!--/MAIN STORY--><!--QUOTES DIV-->

<div style=3D"max-width:800px; margin:auto; background-color:#676767; pad=
ding: 10px 10px 10px 10px; text-align:center; border-radius:6px;"><span s=
tyle=3D"font-size:24px; line-height:24px; font-family: 'Open Sans', sans-=
serif; color:#ffffff; letter-spacing:6px;">Quotes of the Week</span></div=
>
<!--/QUOTES DIV--><!--QUOTES TEXT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:center;">
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><i>"One way to get the most out of life is =
to look upon it as an adventure."</i> - William Feather<br>
<br>
<i>"The very basic core of a man's living spirit is his passion for adven=
ture."</i> - Christopher McCandless </span><br>
=C2=A0
<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><strong>Thanks for reading CyberheistNews</=
strong><br>
But if you want to unsubscribe, you can do that <a href=3D"http://newslet=
ter.knowbe4.com/a/1022/click/447/1921889/486ae771c748e753c0a203927ab7bc2a=
f91a1576/e93212e0ed3f8d76a204d97f70526983ea57886e" style=3D"color:#f16824=
; text-decoration:none;" target=3D"_blank">right here</a><br>
<br>
<strong>You can read CyberheistNews online at our Blog</strong><br>
https://blog.knowbe4.com/cyberheistnews-vol-7-29-ceo-fraud-attacks-were-f=
ar-more-lucrative-than-ransomware-over-the-past-3-years </span>
</div>
<!--/QUOTES TEXT--><!--SECURITY DIV-->

<div style=3D"max-width:800px; margin:auto; background-color:#676767; pad=
ding: 10px 10px 10px 10px; text-align:center; border-radius:6px;"><span s=
tyle=3D"font-size:24px; line-height:24px; font-family: 'Open Sans', sans-=
serif; color:#ffffff; letter-spacing:6px;">Security News</span></div>
<!--/SECURITY DIV--><!--SECURITY TEXT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Evil Corp Hires Criminal Hackers for Highly Targeted Ransomware I=
nfections</span><br>
<br>
The Register just wrote about the difference between your run-of-the-mill=
 spray-and-pray ransomware infections, and highly targeted manual deploym=
ent attacks like the SamSam or Samas attacks that have hit hospitals rece=
ntly, locking all machines and demand exorbitant ransoms. The attacks are=
 targeted against banking and infrastructure firms worldwide.<br>
<br>
Criminal hackers penetrating the network usually start with a spear phish=
ing attack, and then laterally move through the network to get the lay of=
 the land and then locking all machines at the same time with a shock-and=
-awe effect. More, and 10 things to do about it at the KnowBe4 Blog:<br>
https://blog.knowbe4.com/evil-corp-hires-criminal-hackers-for-highly-targ=
eted-ransomware-infections </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Data Breaches Are up 29 Percent Over Last Year</span><br>
<br>
Data breaches are running 29 percent above last year, according to a repo=
rt released by the Identity Theft Resource Center and CyberScout. Hacking=
 was the leading cause of data breaches nationwide, more than 790 so far =
this year.<br>
<br>
More than 12 million records have been exposed, although two-thirds of da=
ta breach notifications or public notices did not report the number of re=
cords compromised. =E2=80=9COnly 33 percent of data breaches reported thi=
s year have made the number of records exposed publicly available,=E2=80=9D=
 said Karen A. Barney, director of research and publications at Identity =
Theft Resource Center, an increase of 13 percent over 2016 mid-year numbe=
rs.<br>
<br>
More than half of all beaches this year have occurred in business, follow=
ed by health care and medical. Breaches in the medical and health-care in=
dustry are most likely to include the number of records involved. More th=
an 80 percent of breaches in 2017 that were reported to Health &amp; Huma=
n Services included the number of records.<br>
<br>
Read about the new report at the San Diego Union Tribune:<br>
http://www.sandiegouniontribune.com/news/data-watch/sd-me-g-data-breaches=
-20170619-story.html </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Ransomware Attack on KQED TV, Radio Station Wiped out Pre-Recorde=
d Segments</span><br>
<br>
KQED, a TV and radio station in San Francisco, is an example that shows h=
ow badly any organization can suffer when ransomware hits their network. =
KQED has been trying to recover from the damages of a massive ransomware =
attack for more than a month.<br>
<br>
The San Francisco Chronicle reported that the station received a massive =
ransomware attack on June 15. The attack was so severe that it has been =E2=
=80=9Cbombed back to 20 years ago, technology-wise=E2=80=9D as per the an=
alysis of one KQED=E2=80=99s senior editor Queena Kim.<br>
<br>
During the attack, the station=E2=80=99s computer systems=E2=80=99 hard d=
rives got locked, station=E2=80=99s internal email server went offline an=
d pre-recorded segments were totally wiped out. For over 12 hours the onl=
ine broadcast of the station remained offline, and official Wi-Fi connect=
ion also went offline for many days. More at the KnowBe4 blog:<br>
https://blog.knowbe4.com/ransomware-attack-on-kqed-tv-radio-station-wiped=
-out-pre-recorded-segments </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">What It=E2=80=99s Like When Pro Phishers Assail Your Inbox</span>=
<br>
<br>
Lily Hay Newman wrote in WIRED: "ON A TYPICAL morning I have about 30 new=
 emails in my personal inbox, and 40 in my work account. You know how it =
is.<br>
<br>
I archive what I don't want, scan part of a newsletter, click through to =
a coworker's Google Doc, and click "track my package" more often than I'd=
 like to admit. It's all pretty standard stuff.<br>
<br>
These days, though, I face my inboxes with grim determination. Because fo=
r about five weeks this spring I was under attack by a team of hackers fr=
om the company PhishMe whose goal was to ... phish me.<br>
<br>
I had given company CTO Aaron Higbee my personal and professional email a=
ddresses, and full permission to trick me into clicking on a malicious li=
nk, downloading a nasty attachment, or visiting a bogus site where my per=
sonal information could be compromised.<br>
<br>
If you think that might instill a certain depth of paranoia, you're absol=
utely right. Every email from my doctor could be fake. Every shared album=
 of vacation photos, a trap. I knew that they were coming for me. I just =
didn't know when or how."<br>
<br>
Excellent article. Do I wish it would have been KnowBe4 instead? Sure. Bu=
t the message is just as valid for any of the three leading companies in =
this space, whether PhishMe, KnowBe4 or Wombat. This is something you *ha=
ve* to do, because your users are your last line of defense:<br>
https://www.wired.com/story/phishing-attempts-email-inbox/ </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Putin=E2=80=99s Hackers Now Under Attack=E2=80=94From Microsoft</=
span><br>
<br>
Techcrunch observed: "The Daily Beast details how, in 2016, Microsoft=E2=80=
=99s legal team sued Fancy Bear (also known by many other aliases) for re=
serving domain names that violated Microsoft trademarks.<br>
<br>
Apparently, in the course of claiming generic domains for its operations,=
 Fancy Bear often selected domains that riff off of Microsoft products an=
d services, inadvertently opening the door to the lawsuit.<br>
<br>
While you can=E2=80=99t exactly drag an amorphous, faceless hacking group=
 into court, the lawsuit served one key purpose: it hijacked some of Fanc=
y Bear=E2=80=99s servers. In the last year, Microsoft has taken over at l=
east 70 different Fancy Bear domains, many of which served as =E2=80=9Cco=
mmand-and-control=E2=80=9D points so the hackers could communicate with t=
he malware they installed on targeted computers.<br>
<br>
When a domain flips over into Microsoft=E2=80=99s hands, the company can =
use it to observe and map Fancy Bear=E2=80=99s server network, which comm=
unicates with the Microsoft domains. The result is that the company can i=
ndirectly disrupt and observe aspects of a suspected foreign intelligence=
 operation =E2=80=94 a pretty clever trick for a tech company to pull off=
 in its spare time:"<br>
http://www.thedailybeast.com/microsoft-pushes-to-take-over-russian-spies-=
network </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;">
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><span style=3D"font-size: 24px; line-height=
:30px; font-family: 'Open Sans', sans-serif; color: #f16622;">How Weak Ar=
e Your User=E2=80=99s Passwords?</span><br>
<br>
Are your user=E2=80=99s passwords=E2=80=A6P@ssw0rd? Verizon's recent Data=
 Breach Report showed that 81% of hacking-related breaches used either st=
olen and/or weak passwords. Employees are the weakest link in your networ=
k security, using weak passwords and falling for phishing and social engi=
neering attacks.<br>
<br>
KnowBe4=E2=80=99s complimentary Weak Password Test (WPT) checks your Acti=
ve Directory for several different types of weak password related threats=
.<br>
<br>
WPT gives you a quick look at the effectiveness of your password policies=
 and any fails so that you can take action. This tests against 10 types o=
f weak password related threats for example; Weak, Duplicate, Empty, Neve=
r Expires, plus 6 more.<br>
<br>
Here's how Weak Password Test works: </span>

<ul>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Reports on the accounts that are affec=
ted</span></li>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Tests against 10 types of weak passwor=
d related threats</span></li>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Does not show/report on the actual pas=
swords of accounts</span></li>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Just download the install and run it</=
span></li>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Results in a few minutes!</span></li>
</ul>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"> This will take you 5 minutes and may give =
you some insights you never expected!<br>
https://info.knowbe4.com/weak-password-test-chn </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Interesting News Items This Week </span><br>
<br>
Dow Jones Leaks Personal Info of 2.2 Million Customers:<br>
https://www.infosecurity-magazine.com/news/dow-jones-leaks-personal-info/=
<br>
<br>
How do SMEs fight off cyber-attacks?:<br>
http://www.itsecurityguru.org/2017/07/18/smes-fight-off-cyber-attacks/<br=
>
<br>
Here is a really good one =E2=80=A6 bad news for students however Newcast=
le University Stung by Sophisticated Phishing Site:<br>
https://www.infosecurity-magazine.com/news/newcastle-uni-stung-by/<br>
<br>
Every organization is only one click away from a potential compromise:<br=
>
https://www.helpnetsecurity.com/2017/07/21/insider-attack-damage/<br>
<br>
Where are the fixes to the botched Outlook security patches?:<br>
http://www.computerworld.com/article/3209710/microsoft-windows/where-are-=
the-fixes-to-the-botched-outlook-security-patches.html </span></div>
<!--/SECURITY TEXT--><!--FAVE DIV-->

<div style=3D"max-width:800px; margin:auto; background-color:#676767; pad=
ding: 10px 10px 10px 10px; text-align:center; border-radius:6px;"><span s=
tyle=3D"font-size:24px; line-height:24px; font-family: 'Open Sans', sans-=
serif; color:#ffffff; letter-spacing:6px;">Cyberheist 'Fave' Links</span>=
</div>
<!--/FAVE DIV--><!--FAVE TEXT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;">
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><span style=3D"font-size: 24px; line-height=
:30px; font-family: 'Open Sans', sans-serif; color: #f16622;">This Week's=
 Links We Like, Tips, Hints and Fun Stuff</span> </span>

<ul>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">This is the best video ever. 14 second=
s on Twitter. You will watch this twice, guaranteed:<br>
	https://twitter.com/lad/status/888146633267007488?s=3D09</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Here is something new: Your Automated =
Security Awareness Program Builder (ASAP).<br>
	This is the ASAP video: https://vimeo.com/226490343<br>
	And this is the link to register and get your custom awareness program i=
mmediately:<br>
	https://info.knowbe4.com/asap-chn</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Ransomware - Anatomy of an Attack. Goo=
d video by Cisco<br>
	https://www.youtube.com/watch?v=3D4gR562GW7TI</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Blind magician Richard Turner successf=
ully fools Penn &amp; Teller with his unbelievable card tricks:<br>
	http://www.flixxy.com/blind-card-mechanic-fools-penn-and-teller.htm?utm_=
source=3D4</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Why do you text and drive? This one st=
arts out funny, but then... Great PSA!:<br>
	https://m.youtube.com/watch?v=3DlRYv_2JRCT0&amp;feature=3Dyoutu.be</span=
></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">British entrepreneur invents, builds a=
nd files patent for Iron Man-like flight suit. I want one!:<br>
	https://www.youtube.com/watch?v=3DiZ05iAuIAlc</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">World's Fastest Money Counter:<br>
	http://www.flixxy.com/worlds-fastest-money-counter.htm?utm_source=3D4</s=
pan></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Magician and card thrower Rick Smith s=
hows off his incredible card throwing tricks with the guys from Dude Perf=
ect:<br>
	http://www.flixxy.com/amazing-card-throwing-tricks.htm?utm_source=3D7</s=
pan></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Old NASA computers and space probe dat=
a tapes found in dead engineer's basement:<br>
	http://boingboing.net/2017/07/21/old-nasa-computers-and-space-p.html</sp=
an></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Watch two Teslas totally smoke a sport=
 bike and try not to smirk. Full disclosure, I drive a Tesla Model S P85D=
: :-D<br>
	http://bgr.com/2017/07/21/tesla-vs-motorbike-drag-race-humiliation/</spa=
n></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">When Top Gear Tried it's Best to Stop =
Tesla and Elon Musk:<br>
	https://www.youtube.com/watch?v=3DQErBQWUQyEI&amp;feature=3Dyoutu.be</sp=
an></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Technical Backgrounder Here's How Elec=
tric Cars Produce Instant Maximum Torque:<br>
	http://www.popularmechanics.com/cars/hybrid-electric/a27394/how-electric=
-cars-produce-instant-torque/</span></li>
</ul>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"> </span>
</div>
<!--/FAVE TEXT--><!--SOCIAL & COPYRIGHT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 20px 20px;=
">
<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
<div style=3D"max-width:400px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:left; text-align:left; line-height:12px;"><span style=3D"font-size:10p=
x; line-height:10px; font-family: 'Open Sans', sans-serif; color:#676767;=
">FOLLOW US ON: <a href=3D"http://newsletter.knowbe4.com/a/1022/click/447=
/1921889/12f6f18bb2280eb257fda0ee104ee0a8a9355394/e93212e0ed3f8d76a204d97=
f70526983ea57886e" style=3D"color:#f16824; text-decoration:none;" target=3D=
"_blank">Twitter</a> | <a href=3D"http://newsletter.knowbe4.com/a/1022/cl=
ick/447/1921889/35c8d23f428e99808212e79c497c5c7904ccc19f/e93212e0ed3f8d76=
a204d97f70526983ea57886e" style=3D"color:#f16824; text-decoration:none;" =
target=3D"_blank">LinkedIn</a> | <a href=3D"http://newsletter.knowbe4.com=
/a/1022/click/447/1921889/665fd8e8468a0fa0d279b30bd4c7ba97f04517dd/e93212=
e0ed3f8d76a204d97f70526983ea57886e" style=3D"color:#f16824; text-decorati=
on:none;" target=3D"_blank">Google</a> | <a href=3D"http://newsletter.kno=
wbe4.com/a/1022/click/447/1921889/947165ed658284c668dbae4f407761b5796d074=
5/e93212e0ed3f8d76a204d97f70526983ea57886e" style=3D"color:#f16824; text-=
decoration:none;" target=3D"_blank">YouTube</a></span></div>

<div style=3D"max-width:400px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:right; text-align:right; line-height:12px;"><span style=3D"font-size:1=
0px; line-height:10px; font-family: 'Open Sans', sans-serif; color:#67676=
7;">Copyright =C2=A9 2014-2017 KnowBe4, Inc. All rights reserved.</span><=
/div>
</div>
<!--SOCIAL & COPYRIGHT-->


</td></tr>
<tr><td>
<div class=3D"footersp" style=3D"height:1px; width: 100%; margin-left: au=
to; margin-right: auto; background-color:black;display:block !important;"=
>=C2=A0</div>
=C2=A0

<div class=3D"footerco" style=3D"margin-left: auto; margin-right: auto; w=
idth: 100%; background-color:#ffffff !important; display:block !important=
;">
<table border=3D"0" cellpadding=3D"0" cellspacing=3D"0" style=3D"width:10=
0%; display:table !important;">
	<tbody>
		<tr style=3D"display:table-row !important;">
			<td style=3D"width:20%; display:table-cell !important;">=C2=A0</td>
			<td align=3D"center" style=3D"mso-table-lspace: 0pt;mso-table-rspace: =
0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;text-align:=
center;vertical-align:middle; display:table-cell !important;font-size:8.0=
pt; font-family:'Arial','sans-serif'; color:#666666;">This email was sent=
 to <b>edward@transocean.com</b> by <b>feedback@knowbe4.com</b><br>
			<br>
			33 N Garden Ave, Suite 1200 Clearwater, FL 33755 USA<br>
			=C2=A0
			<div style=3D"display:block"><a class=3D"maro_no_record" href=3D"http:=
//newsletter.knowbe4.com/a/1022/one_click_unsubscribe/447/1921889/e93212e=
0ed3f8d76a204d97f70526983ea57886e" rel=3D"nofollow" style=3D"border:0px;c=
olor:#000;display:inline !important;">1-Click Unsubscribe</a></div>
			</td>
			<td align=3D"right" style=3D"text-align:right;mso-table-lspace: 0pt;ms=
o-table-rspace: 0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: =
100%;width:20%;vertical-align:middle; display:table-cell !important;font-=
size:8.0pt; font-family:'Arial','sans-serif'; color:#666666;" valign=3D"m=
iddle">=C2=A0</td>
		</tr>
	</tbody>
</table>
</div>
</td></tr>
</table></body></html>


    </body>
  </html>

----==_mimepart_59760161b8cae_5c2f363837085605382--
