The LMT Blog

Infamous Twitter Hack Inspires a New Phishing Attack

Oct 2, 2020 10:36:41 AM / by KnowBe4 posted in IT, security, Cyber-Security, Cybersecurity, Email Compromise, Cybercrime, Cyber Crime, Phishing

0 Comments

This past July, Twitter fell victim to an infamous social engineering attack. The attack gave hackers control of over one hundred high-profile accounts - from politicians to celebrities. The hackers used these accounts to scam Twitter followers out of money. Now, cybercriminals are using this event as bait for a convincing phishing scam.

The phishing email uses text that is very similar to the official statement that Twitter made in response to the July attack. The email claims that due to a security breach, you must confirm your identity by clicking on a link in the email. If you click the link, you are redirected to a site that looks very similar to the real Twitter login page. The site is actually a look-alike designed to steal your login credentials. Any information that you enter on this page is delivered straight to the bad guys.

Don’t be fooled! Follow these tips:

Read More

Alert from KnowBe4 - Exploiting the Coronavirus: Financial Relief Scam Targeting Organizations

Aug 20, 2020 9:00:00 AM / by KnowBe4 posted in Cyber-Security, Cybersecurity, Coronavirus, Email Compromise, Business, Financial Relief, Phishing

0 Comments

The Coronavirus pandemic continues to impact organizations across the globe. This hardship gives cybercriminals the perfect bait: a promise of financial relief. Currently, cybercriminals are impersonating the United States Small Business Administration (SBA) with a very convincing phishing email. While this specific scam targets organizations in the US, this tactic could be used in any country, for any kind of relief fund.

Read More

Business Continuity vs. Disaster Recovery

Aug 19, 2020 8:30:00 AM / by Alma Vieru posted in IT, technology, Cybersecurity, COVID-19, Business Continuity, Disaster Recovery, BCDR, Small Business, Business

0 Comments

It was the early morning hours when the phone rang. A fire had broken out in the building where we had our business. We threw on our coats and raced to the location. All I saw were flames and smoke as the firefighters worked to gain control of the blaze. It wasn't a surprise when I was informed the structure was a total loss - and everything in it. Where do we go from here? 

Read More

Warning! Vendor Email Compromise on the Rise

Aug 12, 2020 9:00:00 AM / by April L. Sy and James Keeler posted in IT, security, Cyber-Security, Cybersecurity, Email Compromise, Vendor Email Compromise, VEC, Cybercrime, Cyber Crime, Silent Starling

0 Comments

There’s a phishing attack out there that is stealthy and not easily detected until the damage is done. It’s called Vendor Email Compromise, and it’s worth billions worldwide.

Read More
Share on Social:

    Subscribe to Email Updates


    New call-to-action

    Recent Posts