Guest Post: Dropbox will start disabling its password manager this week — act before you lose access to your accounts

Posted in Commentary with tags on August 26, 2025 by itnerd

Dropbox is not the first company to make such a decision this year

Starting this Thursday, August 28, Dropbox will turn off the autofill functionality and users won’t be able to edit or add new passwords anymore. Though, you will be able to download your credentials for around a week after that. 

Dropbox recently announced that it is focusing on its core product and discontinuing Dropbox Passwords — a security application designed to host and manage login credentials. Users are urged to migrate any saved content to their personal storage solutions by October 28. Otherwise, access to saved passwords could be lost.

Phasing out timeline

  • On August 28, the autofill functionality will be turned off and users won’t be able to edit or add new passwords anymore.
  • On September 11, the mobile app will be closed. But the browser extension will still work for a while.
  • On October 28, the browser extension will be closed and all entries will be deleted.

Starting to look like a trend

“We’ve certainly taken note of Dropbox’s announcement regarding the discontinuation of Dropbox Passwords. For those who relied on it, this news can feel disruptive and leave people wondering how best to secure their online lives going forward. But it’s not the first time this sort of decision has been made this year. Companies abandoning non-core activities and disabling password managers or password management functions is starting to look like a trend in the technology market. Earlier this year, Deutsche Bank turned off the document and password vault in its online banking platform, and Microsoft just finished phasing out password management functionality in its Authenticator app,” says Karolis Arbaciauskas, head of business product at NordPass.

“This development, while challenging for affected individuals, highlights an increasingly crucial aspect of personal and organizational cybersecurity: the need for robust, reliable, and dedicated solutions. In other words, relying on integrated features within a broader service, which might be subject to strategic shifts, can expose users to unexpected vulnerabilities. But in the long run, this shift can be beneficial. Users will likely move from integrated solutions to dedicated cybersecurity tools. Meanwhile, Dropbox, Deutsche Bank and other non-cybersecurity companies will be able to focus on their core products. Keeping services, such as password vaults secure and up to date is costly and requires constant attention,” he adds.

Note for admins

Arbačiauskas notes that businesses, more specifically IT or cybersecurity administrators, should also pay attention to Dropbox’s notification, because each team member will also need to take the action to export their password data.

“Admins: Each team member will need to take the action above to export their password data. To see which of your team members are using Dropbox Passwords, go to the Passwords page in the admin console. If a team member has a Passwords score, then that indicates they’re using Dropbox Passwords. If it says Inactive then that user is not using Dropbox Passwords.” Dropbox informs.

How to export your passwords

Dropbox provides the following instructions:

Browser extension

  • Open the Dropbox Passwords browser extension.
  • Click your avatar (profile picture or initials) in the bottom-left corner.
  • Click “Preferences.”
  • Click the “Account” tab.
  • Click “Export.”
  • Click “Export” to confirm.

Mobile app

  • Open the Dropbox Passwords mobile app.
  • Tap “Settings.”
  • Tap “Export.”
  • Tap “Export” to confirm.

“Just remember to delete the unencrypted CSV file after you import your credentials to another password manager,” says Arbaciauskas.

ABOUT NORDPASS

NordPass is a password manager for both business and consumer clients. It’s powered by the latest technology for the utmost security. Developed with affordability, simplicity, and ease of use in mind, NordPass allows users to access passwords securely on desktops, mobile devices, and browsers. All passwords are encrypted on the device, so only the user can access them. NordPass was created by the experts behind NordVPN — the advanced security and privacy app. For more information: nordpass.com.

CloudSEK Study Shows How AI Summaries Can Be Poisoned With Hidden Malware Instructions

Posted in Commentary with tags on August 25, 2025 by itnerd

CloudSEK’s latest research reveals a novel cyber threat that exploits the trust users place in AI summarization tools, turning them into unintentional delivery mechanisms for ransomware.

The report, titled Trusted My Summarizer, Now My Fridge Is Encrypted, demonstrates how attackers can use invisible prompt injection and prompt overdose techniques to manipulate AI-powered summarizers embedded in email clients, browsers, and productivity apps. By embedding malicious payloads in HTML with CSS-based obfuscation (such as white-on-white text, zero-width characters, and off-screen rendering), attackers can trick AI summarizers into reproducing ClickFix-style step-by-step ransomware instructions in their summaries.

Key Findings

  • Invisible Prompt Injection: Attackers hide malicious text in HTML using CSS tricks, invisible to humans but fully interpretable to AI summarizers.
  • Prompt Overdose: Payloads are repeated dozens of times, overwhelming the summarizer’s context window and ensuring attacker instructions dominate outputs.
  • Weaponized Summarizers: When users rely on summarizers to triage content, the AI may unknowingly echo back attacker-controlled ransomware steps as trusted advice.
  • Real-World Proof-of-Concept: CloudSEK successfully demonstrated how hidden payloads can instruct users to run Base64-encoded PowerShell commands simulating ransomware delivery.
  • Amplified Social Engineering: Because instructions appear to come from a trusted AI assistant rather than an external actor, the likelihood of compliance is significantly higher. 


Potential Impact

  1. Mass Amplification of Attacks — Summarizers in email previews, search snippets, and browser extensions could echo attacker payloads at scale.
  2. Lower Barrier for Ransomware Execution — Even non-technical users could be tricked into executing ransomware payloads.
  3. SEO-Driven Threat Multiplication — Poisoned blogs, forums, and indexed content could spread malicious instructions widely.
  4. Enterprise Risks — Internal copilots and summarizers could inadvertently relay attacker steps into trusted business workflows.
  5. Operational & Reputational Harm — Ransomware incidents delivered via trusted AI tools may cause higher compliance rates, longer downtimes, and financial losses.


Mitigation Strategies

CloudSEK recommends immediate defensive measures, including:

  • Client-Side Sanitization — Strip suspicious CSS elements (opacity:0, zero-width, white-on-white) before processing.
  • Prompt Filtering — Detect and neutralize hidden meta-instructions or excessive repetition.
  • Payload Detection — Use heuristics to identify encoded commands and malicious patterns.
  • User Awareness & Safeguards — Summarizers should indicate whether steps originate from visible or hidden content.
  • Enterprise AI Policy Enforcement — Organizations must screen inbound HTML/documents for hidden text before ingestion.
     

Aspire Rural Health Systems Pwned By Ransomware

Posted in Commentary with tags on August 25, 2025 by itnerd

Aspire Rural Health System has disclosed a ransomware-related data breach impacting nearly 140,000 individuals across its Michigan facilities. Hackers accessed Aspire’s systems between November 2024 and January 2025, stealing files containing personal and health information, as well as financial and HR records. The BianLian ransomware group claimed responsibility in February, though it has since gone dark, leaving questions about the fate of the stolen data. The breach underscores the continuing scale of healthcare-related cyber incidents, which often affect hundreds of thousands to millions of individuals.

Andrew Obadiaru, CISO, Cobalt had this to say:

“Healthcare continues to be one of the most targeted sectors because the data is highly valuable, operations are time-sensitive, and legacy systems often leave gaps for attackers to exploit. What stands out in Aspire’s case is the delay between breach, discovery, and disclosure, which leaves a dangerous window where stolen data can be monetized. Ransomware groups like BianLian exploit these blind spots by exfiltrating sensitive information long before defenses catch up. Closing that gap requires not only preventative measures but ongoing security testing to validate defenses against the techniques attackers are using today.”

BianLian has really been busy as a number of high profile ransomware attacks have been claimed by them. That’s why you need to do everything possible to stop this group and other threat actors from making you their next victim.

KnowBe4 Hires New Chief Information Officer Joel Kemmerer

Posted in Commentary with tags on August 25, 2025 by itnerd

KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management (HRM), today announced it has hired experienced IT executive Joel Kemmerer as the new chief information officer (CIO) to help lead critical digital transformation initiatives.  

Kemmerer is a veteran IT executive and CIO, with over 30 years of experience in various IT leadership positions for technology companies such as N-able Inc., SolarWinds, Advanced Micro Devices (AMD) and others. Kemmerer earned his bachelor of business administration from the McCombs School of Business at the University of Texas and his master of business administration from the Edwin L. Cox School of Business at Southern Methodist University. Previously, his organization was the recipient of a 2022 American Business Awards Gold Stevie for Information Technology Department of the Year. 

For more information on KnowBe4 careers, visit https://www.knowbe4.com/careers

Guest Post: In live sports streaming, some minutes matter more than others

Posted in Commentary with tags on August 25, 2025 by itnerd

By: Sofie Feeney, Regional Leader for Northern Europe at Cisco ThousandEyes

A data driven approach to optimize live sport streaming

Broadcasters have long been awake to the issues of a break in programming or transmission.

Dead air – when silence is mistakenly broadcast instead of regular content – continues to cause maximum discomfort for traditional TV and radio broadcasters, not least because in those crucial seconds of nothingness, people have the chance (and propensity) to switch, either elsewhere or off.

In online streaming, the equivalent experience is glitches – in either network or backend services – that manifest as streams that pixelate, break up, excessively buffer or stop working altogether.

How important those lost seconds or minutes are to a stream depends a lot on the nature of the event. In live sports, an untimely glitch can be the difference between seeing a world record being made, and not.

Visibility into ephemeral connections

Within a live sports broadcast, not all minutes are equal. Proportionally, a minute in the context of the Olympics 100-meter dash carries more weight than a minute in a 90-minute football game.

In the dash, a lost minute could mean missing out on the color commentary preamble as well as the 10-second race in its entirety; in a 90-minute game, the best case scenario is the loss of a comparatively speaking uneventful passage of play.

The exception to that is when a lost minute of the 90-minute game contains a clutch play: where a crucial score is made or a controversial penalty is awarded. Then, that minute is just as important to the broadcast as the one that contains the 100-meter dash final.

The challenge for a streaming provider is that it’s impossible to know ahead of time, of course, with any certainty, which minutes of a live broadcast will be the most crucial: so there’s a need to treat every minute as critical.

One thing that can help streamers – and the service providers that carry streams to customers – is to become more data-driven in their approach, using visibility to understand the ephemeral nature of the connection between the broadcast site and end user audience at any point in time.

This understanding is helpful to make more informed calls that can optimize the streaming experience, such as performing dynamic resource allocation and routing of streams, based on how the live event plays out.

Predicting the Internet path

Top sports streaming providers are increasingly tapping into software agents at different points in the content delivery chain to understand how the stream looks as it makes its way to the consumer.

These software agents can run at the live site, where microwave or satellite links are used to relay content back to a central transmission coordination center; in the data center and cloud, tracing the path content takes as it is sent to a content delivery network (CDN) for onward distribution; and inside consumers’ homes, right up to the point the content reaches the end user’s modem or smart TV.

At all of these different points (hops) in the digital delivery chain, latency and delay can be measured, providing an indication of how the ultimate streaming experience is landing, and whether a performance bottleneck exists that needs to be investigated further.

Visibility and measurement is particularly important wherever content moves off private network links and onto the public Internet. The nature of the Internet and of the underlying network infrastructure means that available paths for traffic are always evolving and constantly changing. Every time a live stream happens, it is likely to encounter a different set of ambient conditions and take a slightly different path to reach the end user.

The predictability of that path depends on how much intelligence the sport or live streaming provider has about it. The greater the visibility, the more predictable the path to the end user is, since the provider can make conscious choices about which network providers they partner with, based on a solid understanding of how each routes or re-routes traffic in a variety of circumstances. It also makes identification of a fault domain easier, in the event a performance bottleneck is identified that requires remediation while the stream is happening.

The best-placed live sports streaming providers are able to validate underlying network conditions before they go live with a broadcast. By setting up tests that show how a stream would perform for different users in different geographic locations, they can be best positioned to understand what is happening ahead of time. They also have a reference point that they can track performance against for the duration of the streaming event.

Gear Up for Back-to-School with Samsung Tech for Every Age & Stage 

Posted in Commentary with tags on August 22, 2025 by itnerd

As the new school year approaches, Samsung is making it easier for students of all ages—from elementary to university—to stay connected, productive, and ahead of the curve. Whether it’s capturing content on-the-go, managing assignments across devices, or staying on top of a busy schedule, Samsung’s latest innovations are designed to meet the diverse needs of students today.

Here are three standout picks for back-to-school season in Canada:

ProductWhat it DoesWhy it Matters
Galaxy Z Flip7Portable, pocketable and ideal for on-the-go access—whether checking class schedules, capturing lecture highlights, or making plans between classes, the Galaxy Z Flip7’s Gemini integration helps students conduct seamless actions across apps – so they never skip a beat. Plus, for study sessions on the go, DeX support lets you connect to an external monitor and use your phone like a mini‑computer—ideal for writing essays or running split‑screen research apps.While 42% of Grade 4 students use a tablet or computer daily for schoolwork, many older students rely on their phones for homework and scheduling accommodations.
Galaxy Book5 Pro Optimized for multitasking: This slim, high-performance laptop is perfect for essay writing, research, or content creation—from the library, lecture hall or coffee shop. Use multi-control to use several Galaxy devices simultaneously, Recall to browse past documents, meetings and emails, and AI Select to circle any on-screen content to instantly search or interpret it.Studies show 60% of Canadian students say that managing multiple assignments at once is a top academic challenge. With its long battery life, fast performance, and seamless cross-device connectivity, the Galaxy Book5 Pro helps students stay productive and focused wherever learning happens, helping them juggle assignments and their busy schedules.
Galaxy Watch8 Smarter schedules, healthier habits: With advanced health tracking and customizable notifications, the Galaxy Watch8 helps students balance their academic, personal, and wellness goals. Pro tip: this is the first ever smartwatch with Gemini built in!Canadian University Health Survey found that 51% of students report feeling stressed regularly. With mindfulness features and fitness tracking, the Watch8 is a personal wellness coach right on the wrist.

Nikon Announces the NIKKOR Z 24-70mm f/2.8 S II, Delivering the Fastest AF and Lightest Weight in its Class

Posted in Commentary with tags on August 22, 2025 by itnerd

 Nikon Canada has announced the release of the new NIKKOR Z 24-70mm f/2.8 S II, a standard zoom lens that is compatible with full-frame/FX format mirrorless cameras. This second generation of the acclaimed NIKKOR Z 24-70mm f/2.8 S brings enhancements to image quality, speed and handling, further improving upon a lens that was already a popular choice for all types of imaging professionals.   

As part of the S-Line of NIKKOR Z lenses, the NIKKOR Z 24-70mm f/2.8 S II is a standard zoom lens with a constant maximum aperture of f/2.8, covering the versatile focal length range from wide-angle 24mm to medium-telephoto 70mm for full-frame/FX format cameras. It features a first in its class internal zoom mechanism, and it’s also the lightest in its class, weighing approximately 675 g (1.49 lbs.). Additionally, the internal zoom mechanism increases zooming stability as well as dust- and drip-resistant performance.

It is the first zoom lens to adopt Silky Swift VCM (SSVCM) motors for the AF drive, achieving the fastest autofocusing in Nikon history with extremely precise and quiet AF control. Autofocus is approximately 5x faster than that of the NIKKOR Z 24-70mm f/2.8 S, and AF tracking performance during zooming has been enhanced by approximately 60 per cent, making it even easier to capture decisive moments with fast-moving subjects such as athletes in action.

As a new-generation f/2.8 standard zoom lens that combines outstanding image quality and superior agility, the NIKKOR Z 24-70mm f/2.8 S II is the lens for those seeking high levels of performance in both still image and video recording, even when shooting in a variety of conditions or harsh environments.

Primary features

  • The multi-focusing system, incorporating Silky Swift VCM (SSVCM) technology for the first time in a zoom lens, achieves the fastest autofocusing in Nikon history, delivering extremely precise and quiet AF for both still image and video recording.
  • A compact design with the lightest weight (approximately 675 g) in its class and a 77mm filter attachment size makes it easy to carry and reduces fatigue when shooting handheld.
  • The first lens in its category to feature an internal zoom mechanism that prevents dust and debris from entering the lens during zooming, providing superior dust- and drip-resistant performance. Even when zooming, it maintains its balance for flexible use of a variety of video accessories.
  • A newly developed 11-blade diaphragm enables very circular bokeh.
  • Optimized for video recording with a design that suppresses focus breathing.
  • Equipped with a control ring clicking switch, allowing the tactile “click” of control ring operation to be turned on or off as needed.
  • The lens supports a minimum focus distance of 0.24 m at the wide-angle end and 0.33 m at the telephoto end, with a maximum reproduction ratio of 0.21× at the wide-angle end and 0.32× at the telephoto end, allowing users to get closer to their subjects for dynamic expression.
  • Includes Meso Amorphous Coat, which offers the best anti-reflection performance in Nikon history, and ARNEO Coat for effective suppression of ghosting and flare, resulting in clear images. 
  • The lens hood features a filter adjustment window, enabling users to adjust circular polarizing and variable ND filters without removing the lens hood.

Price and Availability

The new Nikon NIKKOR Z 24-70mm f/2.8 S II lens will be available in September for a Manufacturer’s Suggested Retail Price (MSRP) of $3,499.95*. For more information about the latest Nikon products, including the vast collection of NIKKOR Z lenses and the entire line of Z series cameras, please visit www.nikon.ca.

Abstract Security Launches PAINT Program to Accelerate Channel Growth Through Strategic Partnerships 

Posted in Commentary with tags on August 21, 2025 by itnerd

Abstract Security today announced the launch of its PAINT Partner Program. (Partnerships, Alliances, and INTegrations). The PAINT program is designed to empower resellers, MSPs, MSSPs, and technology integrators to deliver differentiated cybersecurity solutions and accelerate revenue growth through collaboration with one of the industry’s fastest-growing security innovators. 

Since emerging from stealth in 2023, Abstract Security has attracted global attention for its modern take on the security operations stack. The company’s platform decouples data sources and destinations, offering customizable pipelines, real-time analytics and an AI-powered assistant that simplifies threat investigation and detection across environments.  

Now, with the launch of PAINT, Abstract is formally extending its platform to a broader ecosystem of partners ready to bring these capabilities to market. 

Program Highlights 

The PAINT Partner Program is structured to support partners at every stage of growth, from emerging solution providers to global systems integrators. Key benefits include: 

  • Competitive pricing models with very attractive margin structures. Abstract’s pricing offers predictability, making it easier for partners to maximize profitability while providing value to end customers. We adapt to your business model to provide cost-effective scaling without compromising performance. 
  • Flexible deployment models, including SaaS, self-hosted, and region-specific cloud hosting 
  • Joint go-to-market opportunities, such as co-branded campaigns, sales enablement, and events 
  • Rep-to-rep sales collaboration and technical support to accelerate sales cycles 
  • Access to the Abstract Intelligence Gallery, a curated marketplace with integrations from leading threat intelligence providers 
  • Streamlined onboarding and enablement, including certification pathways and training for both sales and technical teams 

Innovatively Differentiated  

  • Data Pipelines: Streamline data management with efficient pipelines for ingestion, processing, and routing of security data. Our pipelines reduce data complexity, making it easier for customers to extract actionable insights. 
  • Real-Time Security Analytics: Our Analytics engine delivers real-time threat detection and monitoring, allowing your customers to quickly respond to security threats. This high-performance analytics capability meets the demand for fast, accurate data-driven security decisions. 
  • Intel Gallery: Access to curated threat intelligence, providing your customers with a robust resource to reveal threats and stay ahead of those emerging. Abstract’s Intel Gallery helps customers boost their intelligence capabilities, positioning you as providers of cutting-edge security solutions. 
  • Abstract LakeVilla: LakeVilla is designed to give you a reliable, cost-effective way to store and access historical data without the high price tag or slow performance of traditional SIEM solutions. It makes cold storage actually work for security teams – no more painful rehydration and no more expensive re-ingestion. 

Built for Channel-Led Growth 

The PAINT program reflects Abstract’s commitment to building a channel-first business model that rewards joint success. With multi-cloud availability, marketplace listings across AWS, Azure, and Google Cloud, and support for regional hosting in markets like the Middle East, partners can tap into new revenue opportunities across verticals and geographies. 

The PAINT Partner Program is open to qualified partners globally. Interested organizations can learn more and apply by visiting Abstract Security’s partner page. 

https://www.abstract.security/partners

New ‘Quishing’ Attacks Split QR Codes to Highjack Conversations

Posted in Commentary with tags on August 21, 2025 by itnerd

Researchers have discovered Gabagool PhaaS attackers implementing split QR codes in an attack that began as a standard fake Microsoft ‘password reset’ scam. The attackers’ use of highly tailored messages suggests they’d previously implemented a successful conversation hijacking attack against the target.

The details are here: https://blog.barracuda.com/2025/08/20/threat-spotlight-split-nested-qr-codes-quishing-attacks

The technique involves splitting the QR code into two separate images and embedding them in a phishing email. When traditional email security solutions scan the message, they see two distinct and benign-looking images rather than one complete QR code.

Barracuda threat analysts recently found Gabagool attackers implementing split QR codes in an attack that began as a standard fake Microsoft ‘password reset’ scam. The attackers’ use of highly tailored messages suggests they’d previously implemented a successful conversation hijacking attack against the target.

Erich Kron, Security Awareness Advocate at KnowBe4, commented:

“The inclusion of tricky little QR codes in some of the phishing kits or phishing services is indicative of the advancement of attacks, even at the commodity level. What might have been expected from a nation state has now made its way into low cost pay-to-play cyber tools and services. QR codes provide a somewhat unique challenge as many individuals are not aware that they can be weaponized, and many mobile devices do not actually show you the URL it is taking you to, but rather simply ask if you want to open the link in the browser.

“It has always been more difficult to view some threats on mobile devices because the limited screen real estate means that things such as the URL bar in a browser may be hidden from view unless a person intentionally looks for it. In addition, mobile devices tend to connect through cellular services, or unsecured Wi-Fi networks like those in restaurants, airports, hotels, and other public places. This means many security tools that can help keep organization-owned computers safe on the corporate network, are not applied to mobile devices. When on the road, people are far more likely to browse the Internet without the use of a VPN on phones and tablets compared to when they use laptops, losing the security controls available through VPN monitoring.

“The attack itself is fairly common, sending a user to a website designed to look like a legitimate login portal. This is not a novel attack and is a part of many phishing kits or phishing services, but the delivery method of splitting QR codes into multiple images or embedding them within each other to bypass filters is clever and can make things difficult for email filters to spot. Once an attacker steals the credentials of cloud services such as Microsoft 365 or Google, it makes it very easy for them to access email accounts which contain sensitive information, or use those accounts to attack others. Attacks like this highlight the importance of having a comprehensive Human Risk Management (HRM) program in place within organizations. When people are aware of these types of fake login portals, it becomes very easy to spot the fakes, even if the emails are able to get past the technology. The use of MFA can mitigate some of the risk; however many types of MFA are vulnerable to being bypassed, making the inconvenience for attackers minimal.”

QR Code based attacks have been around for a while. But clearly they are evolving. Which means that you have to be more careful than ever to not be a victim of one.

KnowBe4 Report Reveals Global Financial Sector Faces Unprecedented Cyber Threat Surge

Posted in Commentary with tags on August 21, 2025 by itnerd

KnowBe4 has released its latest research paper “Financial Sector Threats Report,” uncovering critical insights into the escalating cybersecurity crisis facing the global financial sector. The report shows that financial institutions face a perfect storm of AI-enhanced attacks, credential theft and supply chain vulnerabilities that pose systemic risks to the global financial industry.

The research reveals almost all (97%) of major U.S. banks experienced third-party breaches in 2024, while targeted intrusions against financial institutions increased by 109% year-over-year. Most concerning, tests in large financial institutions found that nearly 45% of employees were likely to click on a malicious link or download an infected file, creating entry points for threat actors. The report highlights how threat actors are leveraging AI tools like FraudGPT and ElevenLabs to create more convincing phishing campaigns, while simultaneously moving away from traditional ransomware encryption toward data exfiltration and multi-stage extortion schemes. This evolution allows attackers to use legitimate credentials, making detection significantly more challenging. According to Federal Reserve Bank of New York Staff Reports, even a single day’s disruption in payments by major banks could affect 38% of network banks globally.

Key findings from the report:

  • Financial service firms globally experience up to 300 times more cyberattacks annually than other industries, with a 25% year-on-year increase in intrusion events for 2024.
  • 97% of the largest U.S. banks suffered third-party breaches in 2024, while 100% of Europe’s top financial firms suffered supplier breaches, highlighting vulnerabilities in vendor ecosystems.
  • Analysis of over three million dark web posts shows stolen credentials far outpace credit card theft; infostealer infection attempts increased 58% in 2024 and 68% of attacks originating from email.
  • The U.S. accounts for 60% of all ransomware attacks against financial institutions, with the U.S. and U.K. together representing over 70% of attacks, with increasing activity targeting emerging markets in South Asia and Latin America.
  • Large financial institutions show 44.7% Phish-proneTM Percentage (PPP) rates initially, but comprehensive security awareness training reduces phishing susceptibility to below 5%.

Download the full KnowBe4 report “Financial Sector Threats: The Shifting Landscape” here