CyberheistNews Vol 15 #39 | September thirtieth, 2025
[Watch Your Back] Why Your Safety Technique Wants a Human Improve Now
By Javvad Malik
Let’s be brutally sincere. For years, our business has been locked in a civil conflict. In a single camp, the technologists have been constructing greater partitions and smarter traps, arguing that the fitting AI-powered, next-gen firewall will clear up all our issues.
Within the different camp, the behaviorists have been calling for extra coaching and higher consciousness, satisfied that if we simply make folks perceive the dangers, they will cease clicking on issues.
This is the factor: they’re each proper, they usually’re each lacking the purpose.
Whereas we have been arguing, a large elephant has made himself snug in our server rooms.
That elephant is the straightforward undeniable fact that our defenses are fractured. We’re preventing a psychological conflict towards AI-powered adversaries with a method that is cut up proper down the center. The consequence? A staggering 74% of CISOs now contemplate human error their primary threat.
As highlighted in our current human threat administration (HRM) whitepaper, the outdated methods are now not working. The sport has modified, particularly with AI now turbo-charging the tricksters, making their phishing lures and social engineering scams nearly indistinguishable from the actual factor.
The outdated method of simply “making folks conscious” with a once-a-year, tick-box coaching session? That is like bringing a water pistol to a lightsaber combat. It is a compliance exercise, not a safety technique. It’d examine a field for an auditor, however it does little to cease a complicated attacker who is aware of the right way to play on primary human feelings like urgency, helpfulness or worry.
This creates the damaging “Consciousness-Motion Hole”—the chasm between what your workers know they need to do and what they really do at 3PM on a Friday once they’re drained and distracted.
It is time for a peace treaty. It is time for a strategic improve. It is time for HRM.
HRM is not simply one other buzzword; it is a elementary shift in how we strategy safety. It is a unified technique that stops treating know-how and folks as separate issues and begins treating them as a single, interconnected system. It acknowledges you can’t firewall your method out of a well-crafted phishing e mail, and you may’t practice your method out of a poorly designed safety course of.
HRM is about treating the human aspect with the identical analytical rigor we apply to our tech stack. It is about understanding behaviors, motivations and sure, even the occasional lapse in judgement, after which constructing a supportive ecosystem of each tech and tradition to account for it.
[CONTINUED] Weblog submit with hyperlinks:
https://weblog.knowbe4.com/why-your-security-strategy-needs-a-human-upgrade
[Live Demo] Ridiculously Straightforward AI-Powered Safety Consciousness Coaching and Phishing
Phishing and social engineering stay the #1 cyber menace to your group, with 68% of knowledge breaches attributable to human error. Your safety workforce wants a simple solution to ship personalised coaching. That is exactly what our AI Protection Brokers present.
Be part of us for a demo showcasing KnowBe4’s modern strategy to human threat administration with agentic AI that delivers personalised, related and adaptive safety consciousness coaching with minimal admin effort.
See how straightforward it’s to coach and phish your customers with KnowBe4’s HRM+ platform:
- SmartRisk Agent™ – Generate actionable knowledge and metrics that will help you decrease your group’s human threat rating
- Template Generator Agent – Create convincing phishing simulations, together with Callback Phishing, that mimic actual threats. The Beneficial Touchdown Pages Agent then suggests applicable touchdown pages based mostly on AI-generated templates
- Automated Coaching Agent – Robotically determine high-risk customers and assign personalised coaching
- Information Refresher Agent and Coverage Quizzes Agent – Reinforce your safety program and organizational insurance policies.
- Enhanced Government Studies – Monitor consumer actions, visualize developments, obtain widgets, and enhance looking/sorting to supply deeper insights and streamline collaboration
See how these highly effective AI-driven options work collectively to dramatically cut back your group’s threat whereas saving your workforce worthwhile time.
Date/Time: TOMORROW, Wednesday, October 1 @ 2:00 PM (ET)
Save My Spot:
https://information.knowbe4.com/kmsat-demo-1?partnerref=CHN
[AGENT SECURITY] Constructing Brokers and Protecting Them Safe
Two associated subjects right here. First, (@God of Immediate) posted: “Google simply dropped a 64-page information on AI brokers that is mainly a actuality examine for everybody constructing brokers proper now.
The brutal reality: most agent initiatives will fail in manufacturing. Not as a result of the fashions aren’t adequate, however as a result of no one’s doing the unsexy operational work that truly issues.
Whereas startups are transport agent demos and “autonomous workflows,” Google is introducing AgentOps – their model of MLOps for brokers. It is an admission that the present “wire up some prompts and ship it” strategy is basically damaged.
The safety part is sobering. These brokers give LLMs entry to inner APIs and databases. The assault floor is big, and most groups deal with safety as an afterthought.
Google’s strategic wager: the present wave of agent experimentation will create demand for severe infrastructure. They’re positioning because the grown-up alternative when startups understand their prototypes cannot scale.
The information breaks down agent analysis into 4 layers most builders ignore:
- Part testing for deterministic components
- Trajectory analysis for reasoning processes
- Consequence analysis for semantic correctness
- System monitoring for manufacturing efficiency
You could take a look at the truth that with the quantity of brokers which might be added, your assault floor goes up exponentially. Right here is his authentic submit on X: https://x.com/godofprompt/standing/1970418899092152672?s=66&t=vSAPngidkSaQJtTdB6pOmw
Second, A2AS: a “HTTPS for AI brokers” safety layer is coming
A brand new pre-release paper proposes A2AS, a light-weight runtime safety layer for agentic AI—suppose HTTPS for AI brokers. It hardens LLM-powered apps with out including additional hops or exterior guardrails. It is supported by all the large names.
The core “BASIC” mannequin is easy and sensible: Habits Certificates (what an agent is allowed to do), Authenticated Prompts (signed inputs so you possibly can belief the request), Safety Boundaries (clear tags round untrusted knowledge), In-Context Defenses (train the mannequin to disregard malicious directions), and Code-Pushed Insurance policies (your guidelines as code).
The diagram on their whitepaper web page 5 exhibits these controls wrapped round an agent; web page 14 particulars the managed immediate template that devices each message.
Why this issues: actual assaults do not simply jailbreak chatbots—they hijack workflows. The paper walks by means of three widespread failure modes: bill parsing that quietly swaps in a felony’s checking account (consumer→agent, web page 20), e mail triage that exfiltrates your CRM by way of a poisoned message (agent→instrument, web page 21), and log-parsing brokers that unfold “immediate an infection” throughout friends like ransomware (agent→agent, web page 22).
Backside line for IT/Infosec: if you happen to’re piloting brokers, begin with read-only behaviors, signed prompts, boundary tags and coverage checks—and actively take a look at for immediate injection. Notice there are some limits: token overhead, mannequin variability, and right this moment’s text-only scope. Nonetheless, A2AS is a reputable path to standardized runtime safety for AI.
Right here is their web site, the A2AS paper is the very first thing to obtain:
https://www.a2as.org/
The Invisible Menace: How Polymorphic Malware is Outsmarting Your Electronic mail Safety
Roughly $350 million in preventable losses stem from polymorphic malware, malicious software program that continuously modifications its code to evade detection. With 18% of latest malware utilizing adaptive methods that problem conventional defenses, now’s the time to reinforce your group’s safety posture.
Be part of us for this webinar the place James McQuiggan, CISO Advisor at KnowBe4, shares worthwhile insights and proactive methods to strengthen your safety framework towards subtle assaults.
On this session, you may uncover:
- Enhanced detection methods that transcend conventional signature-based approaches to determine polymorphic threats earlier than they affect your techniques
- Proactive protection frameworks particularly designed to counter probably the most subtle shape-shifting malware
- Success tales from organizations that successfully neutralized superior threats by means of strategic safety enhancements
- Communication templates for constructing stakeholder help for safety enhancements
- Sensible implementation roadmaps to strengthen your safety posture towards adaptive threats
Drawing from real-world situations and rising menace intelligence, James will present clear, actionable steerage on your safety groups. You will go away with a sensible toolkit of methods you possibly can implement instantly to reinforce your group’s resilience.
Date/Time: Wednesday, October 8 @ 2:00 PM (ET)
Save My Spot:
https://information.knowbe4.com/the-invisible-threat-na?partnerref=CHN
New AI-Pushed Phishing Platform Automates Assault Campaigns
Researchers at Varonis warn of a brand new phishing automation platform known as “SpamGPT” that “combines the facility of generative AI with a full suite of e mail marketing campaign instruments.”
Whereas earlier phishing kits have automated components of the assault chain, SpamGPT’s sophistication units it aside from the remainder.
“SpamGPT’s interface and options imitate an expert e mail advertising service, however for unlawful functions,” Varonis writes. “The toolkit is promoted as AI-powered, encrypted, and consists of an AI advertising assistant dashboard to assist create and optimize campaigns.
“The dark-themed UI options modules for marketing campaign administration, SMTP/IMAP setup, deliverability testing, and analytics — providing all of the conveniences a Fortune 500 marketer would possibly anticipate, however tailored for cybercrime. The creators even market SpamGPT as an all-in-one spam-as-a-service platform, blurring the road between official advertising instruments and weaponized automation.”
Whereas official AI instruments have guardrails to curb misuse, SpamGPT features a built-in chatbot that can fortunately generate convincing phishing templates.
“The AI assistant (branded as ‘KaliGPT’ within the promo) is constructed into the platform and is able to generate phishing e mail content material and counsel optimizations,” the researchers write. “This implies attackers now not want to put in writing convincing phishing emails; they will ask the AI for persuasive rip-off templates, topic traces, or focusing on recommendation throughout the spam toolkit.”
Designed to ship emails that bypass safety filters.
Notably, SpamGPT’s builders emphasize that the instrument is designed to ship emails that bypass safety filters. “The platform guarantees assured inbox supply for standard e mail suppliers (Gmail, Outlook, Yahoo, Microsoft 365, and many others.), implying that it has been fine-tuned to bypass their e mail filters,” Varonis says.
“In different phrases, the toolkit does not simply ship bulk e mail; it engineers bulk e mail that lands within the inbox. A part of attaining this includes abusing trusted cloud suppliers like Amazon AWS or SendGrid to mix in with official mail visitors. These options mix to present attackers a professional-grade spam operation at their fingertips.”
KnowBe4 empowers your workforce to make smarter safety choices day-after-day.
Weblog submit with hyperlinks:
https://weblog.knowbe4.com/new-ai-driven-phishing-platform-automates-attack-campaigns
Large Information: We’re now on TikTok, Instagram and YouTube Shorts!
We have simply launched bite-sized safety content material that is quick, candy and really helpful. First course on the menu: Learn how to spot romance scams earlier than they steal your coronary heart and your pockets. Lastly, safety coaching that scrolls as easily as your social media feed!
Observe us for probably the most enjoyable solution to keep security-smart!
TikTok & Instagram: @KnowBe4Inc
YouTube: @KnowBe4
Quotes of the Week
“We should always each night time name ourselves to an account: What infirmity have I mastered right this moment? What passions opposed? What temptation resisted? What advantage acquired? Our vices will abate of themselves in the event that they be introduced day-after-day to the shrift.”
– Lucius Annaeus Seneca – Thinker, Statesman, Dramatist (5 BC – 65 AD)
“Difficulties mastered are alternatives received.”
– Winston Churchill – Statesman (1874 – 1965)
You may learn CyberheistNews on-line at our Weblog
https://weblog.knowbe4.com/cyberheistnews-vol-15-39-watch-your-back-why-your-security-strategy-needs-a-human-upgrade-now
Safety Information
Attackers Use AI Growth Instruments to Craft Phony CAPTCHA Pages
Attackers are abusing AI-powered growth platforms like Lovable, Netlify and Vercel to create and host captcha problem web sites as a part of phishing campaigns, in line with researchers at Pattern Micro.
“Since January, Pattern Micro has noticed an increase in faux captcha pages hosted on such platforms,” the researchers write. “These scams pose a twin menace: deceptive customers whereas evading automated safety techniques.
“The phishing campaigns sometimes start with spam emails carrying pressing messages comparable to: ‘Password Reset Required’ or ‘USPS Change of Deal with Notification,’ that are normal ways which might be a staple of these kind of assaults. Clicking the embedded URL directs the goal to what seems to be a innocent captcha verification web page.”
If a consumer completes the captcha, they will be redirected to a phishing web page designed to steal their credentials. Whereas these AI instruments are often deployed for official functions, they are often helpful for attackers for the next causes:
- “Ease of deployment: Minimal technical abilities are required to arrange convincing faux captcha websites. On Lovable, attackers can use vibe coding to generate a faux captcha or phishing web page, whereas Netlify and Vercel make it easy to combine AI coding assistants within the CI/CD pipeline to churn out faux captcha pages.
- Free internet hosting: The supply of free tiers lowers the price of entry for launching phishing operations.
- Official branding: Domains ending in *.vercel[.]app or *.netlify[.]app inherit credibility from the platform’s popularity that the attackers can leverage.”
Worker coaching provides your group an necessary layer of protection towards social engineering assaults. “Educate workers on the right way to spot captcha based mostly phishing makes an attempt,” the researchers write. “This consists of educating them to confirm URLs earlier than interacting with captchas, use password managers (which will not autofill on phishing websites), and report suspicious pages.”
KnowBe4 empowers your workforce to make smarter safety choices day-after-day.
Weblog submit with hyperlinks:
https://weblog.knowbe4.com/attackers-use-ai-development-tools-to-craft-phony-captcha-pages
Report: Deepfake Assaults Have Focused Almost Two-Thirds of Organizations
A survey by Gartner discovered that 62% of organizations have been hit by a deepfake assault prior to now twelve months, Infosecurity Journal studies. Akif Khan, senior director at Gartner Analysis, advised Infosecurity Journal that deepfakes are at present being utilized in social engineering assaults to impersonate executives and trick workers into transferring cash.
“That is trickier as a result of social engineering is a perpetually dependable factor for attackers to make use of,” Khan mentioned. “If you throw deepfakes in there, your workers actually are on the frontline of attempting to identify one thing [that] is uncommon. You may’t simply depend on automated defenses to guard you.”
Moreover, the survey discovered that 32% of entities skilled assaults on AI purposes that abused software prompts. “Chatbot assistants are weak to a wide range of adversarial prompting methods, comparable to attackers producing prompts to control massive language fashions (LLMs) or multimodal fashions into producing biased or malicious output,” Gartner says.
A defense-in-depth technique may also help organizations cease assaults that bypass technical defenses. As know-how evolves, following safety finest practices stays a vital fortification towards social engineering assaults.
Khan added in a press launch, “As adoption accelerates, assaults leveraging GenAI for phishing, deepfakes, and social engineering have grow to be mainstream, whereas different threats — comparable to assaults on GenAI software infrastructure and prompt-based manipulations — are rising and gaining traction.
“Relatively than making sweeping modifications or remoted investments, organizations ought to strengthen core controls and implement focused measures for every new threat class.”
AI-powered safety consciousness coaching provides your group a vital layer of protection towards social engineering assaults.
Infosecurity Journal has the story:
https://www.infosecurity-magazine.com/information/deepfake-attacks-hit-twothirds-of/
What KnowBe4 Clients Say
“I’m the IT Supervisor right here, and I’ve had intensive expertise with KnowBe4 all through my profession. Nonetheless, it wasn’t till becoming a member of this new firm that I had the privilege of working straight with an account supervisor.
“Debbie O. has been really excellent. Her deep experience with the platform, coupled together with her professionalism and real dedication to supporting our workforce, has made her a useful accomplice. Working together with her has been an absolute pleasure, and due to her dedication and excellence, I’ll proceed to advocate for KnowBe4 at any group I’m part of.
– A.C., IT Supervisor
“I wished to take a second to precise my honest appreciation for Britni’s unwavering help and professionalism. She persistently demonstrates a excessive stage of dedication and reliability, all the time making herself out there when help is required.
“Regardless of what number of occasions I’ve reached out, Britni responds with a willingness to assist, by no means hesitating to step in or present steerage. On the uncommon events she is unable to help straight, she ensures I am by no means left with out course or subsequent steps.
“Her proactive communication and comply with by means of are really commendable. Britni has been phenomenal in aiding me right here at United Approach. Her efforts not solely mirror her private dedication to excellence but in addition positively signify the values of your workforce.
“She is, with out query, an amazing asset, and I imagine she deserves recognition for the constant worth she brings.
– S.S., Safety Advisor
The ten Fascinating Information Objects This Week
Cyberheist ‘Fave’ Hyperlinks