Vulnerabilities / Threats
4/11/2016
05:00 PM
Dark Reading
Dark Reading
Products and Releases
100%
0%

KnowBe4 Unveils Kevin Mitnick Security Awareness Training Spring 2016

KnowBe4 adds first human pentest, USB drive test, and geo-location to simulated phishing testing.

(Clearwater/Tampa Bay, FL) April 12, 2016 -- KnowBe4 Inc., the United States’ most popular integrated platform for security awareness training and simulated phishing tests, released a new Spring 2016 version with advanced security features, bringing enterprise level security features to SMBs. Exploding threats of ransomware, CEO email fraud and other social engineering attacks make employee training a must. KnowBe4 helps IT manage the risks of social engineering with advanced security features in its new Kevin Mitnick Security Awareness Training Spring 2016.

An FBI alert issued on April 4, 2016 warned of a massive increase in CEO fraud to the tune of 2.3 billion dollars. Companies are now realizing they cannot keep doing the same old annual awareness training, as threats are evolving much faster.

KnowBe4’s program provides a comprehensive new-school approach that integrates baseline testing using mock attacks, engaging web-based training and continuous assessment through simulated phishing, vishing or smishing attacks to build a more resilient and secure organization. KnowBe4 also provides "double-random" message delivery with hundreds of highly realistic phishing messages, spread over time. Every employee receives a different phishing email at a different time, eliminating the “prairie dog” effect. Automated phishing campaigns with unlimited usage and community templates help keep IT efforts current. The new advanced features include:

  • EZXploit™: Includes patent pending functionality that allows an internal, fully automated "human pentest". By launching a simulated phishing attack, which when clicked, comes up with a secondary ruse like a Java popup that the user is further social engineered to click on. No malicious action is performed but the process allows IT to see which data is accessible and users most prone to click by scanning info such as user name, IP address, a user's workstation and Active Directory info.

KnowBe4’s Chief Hacking Officer Kevin Mitnick stated "EZXploit truly assesses whether your business can be exploited by the bad guys. Just clicking on a link sent in email alone doesn't mean your business can be successfully phished. The true test is to determine whether the user can be exploited. EZXploit allows you to evaluate that risk."

  • USB Drive Test™: A customer can download a special, "beaconized" Microsoft Office file from the KnowBe4 admin console onto a USB drive which can then be dropped at an on-site, high traffic area. If an employee picks up the USB drive, plugs it in their workstation, and opens the file, it will "call home" and report the fail.

A recent study sponsored by University of Illinois, University of Michigan and Google, found 98% picked up dropped USBs and 45% opened or enabled files, confirming this as an effective attack vector for social engineering.

  • GEO-location was added by KnowBe4 to its phishing templates, allowing an admin to see where simulated phishing attack failures are on a map, with drilldown capability and CSV-export options. This is highly useful for multi-site offices and road warriors alike.

KnowBe4’s CEO Stu Sjouwerman stated, “Employees are the weakest link in your network security and you need effective security awareness training to keep on top of furiously innovating cybercrime. The new features we are announcing were previously out of reach for IT managers with limited budget, and we have worked hard to make effective training and frequent simulated phishing affordable for these companies.”

The strong demand for KnowBe4’s training has propelled it into the Cybersecurity 500 and fueled unparalleled growth for 11 straight quarters.

For more information, pricing, or demos, visit www.KnowBe4.com

About KnowBe4
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created by two of the best known names in cybersecurity, Kevin Mitnick (the World’s Most Famous Hacker), and Inc. 500 alum serial security entrepreneur Stu Sjouwerman, to help organizations manage the problem of social engineering tactics through new school security awareness training. The company maintains a top spot in the Cybersecurity 500, the definitive list of the world’s hottest and most innovative companies in cybersecurity. More than 3,500 organizations use KnowBe4’s platform to keep employees on their toes with security top of mind. KnowBe4 is used across all industries, including highly regulated fields such as finance, healthcare, energy, government and insurance.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
Secure Application Development - New Best Practices
Secure Application Development - New Best Practices
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.