Attackers are deploying a Microsoft365 OAuth “device code” phishing to bypass your MFA while using legitimate-looking domains.
Find the full report + learn how to equip your team to stay protected 👇
Attackers are deploying a Microsoft365 OAuth “device code” phishing to bypass your MFA while using legitimate-looking domains.
Find the full report + learn how to equip your team to stay protected 👇
Watch now: youtu.be/u4v6CLcwmio
Watch now: youtu.be/u4v6CLcwmio
Reality: password habits say otherwise.
Across generations, “123456” is still the most common password, per @NordPass + @NordStellar.
Strong, unique passwords + MFA still matter. A lot.
Learn how to better protect your data 👇
Reality: password habits say otherwise.
Across generations, “123456” is still the most common password, per @NordPass + @NordStellar.
Strong, unique passwords + MFA still matter. A lot.
Learn how to better protect your data 👇
So, find the overlap, prioritize the toxic combos, and zap risk.
fablesecurity.com/resources/bl...
So, find the overlap, prioritize the toxic combos, and zap risk.
fablesecurity.com/resources/bl...
In our second-to-last blog of the series, we focus on how important targeting is in human risk campaigns.
Learn more about how targeted campaigns have better engagement & lead to lasting change: fablesecurity.com/resources/bl...
In our second-to-last blog of the series, we focus on how important targeting is in human risk campaigns.
Learn more about how targeted campaigns have better engagement & lead to lasting change: fablesecurity.com/resources/bl...
Cybersecurity is adapting to what other industries have known for years: behavior can change when the message is targeted, relevant, and timely.
The shift is starting, and we’re pushing it forward. 🧵
Cybersecurity is adapting to what other industries have known for years: behavior can change when the message is targeted, relevant, and timely.
The shift is starting, and we’re pushing it forward. 🧵
Real risk involves behavior, context, speed, and durability. Not vanity metrics like phishing click rates or training completions.
More details in today’s post: fablesecurity.com/resources/bl...
Real risk involves behavior, context, speed, and durability. Not vanity metrics like phishing click rates or training completions.
More details in today’s post: fablesecurity.com/resources/bl...
Learn more about toxic combos, risk lift, and how this info can help your targeted behavior campaigns 👉
Learn more about toxic combos, risk lift, and how this info can help your targeted behavior campaigns 👉
In this analysis, it’s the tech team. And they’re uploading a lot of code.
Our research shows employees aren’t just playing around, they’re uploading code, documents, and media files.
Read the report: fablesecurity.com/resources/bl...
In this analysis, it’s the tech team. And they’re uploading a lot of code.
Our research shows employees aren’t just playing around, they’re uploading code, documents, and media files.
Read the report: fablesecurity.com/resources/bl...
Behavior decay reveals how fast people drift back to risky habits once a campaign ends.
👉Lasting change needs relevant guidance + ongoing monitoring before the risk comes back.
Check out day 7 of riskmas to learn more: fablesecurity.com/resources/bl...
Behavior decay reveals how fast people drift back to risky habits once a campaign ends.
👉Lasting change needs relevant guidance + ongoing monitoring before the risk comes back.
Check out day 7 of riskmas to learn more: fablesecurity.com/resources/bl...
Recurring phishing simulations in Fable let you automate campaigns for up to a year—no constant setup, no busywork—so your team can focus on the strategic stuff.
Read more: fablesecurity.com/resources/bl...
Recurring phishing simulations in Fable let you automate campaigns for up to a year—no constant setup, no busywork—so your team can focus on the strategic stuff.
Read more: fablesecurity.com/resources/bl...
Want to know where the risky business really happens? Cohort analysis.
Your targeting gets sharper. Your risk gets smaller. Your strategy gets smarter.
Unwrap today’s blog 👉
Want to know where the risky business really happens? Cohort analysis.
Your targeting gets sharper. Your risk gets smaller. Your strategy gets smarter.
Unwrap today’s blog 👉
Meet TTBC: the metric that shows how long the “I’ll do it later” gap keeps your org exposed.
If we want to reduce real risk, we have to measure the moment awareness → action.
Read more: fablesecurity.com/resources/bl...
Meet TTBC: the metric that shows how long the “I’ll do it later” gap keeps your org exposed.
If we want to reduce real risk, we have to measure the moment awareness → action.
Read more: fablesecurity.com/resources/bl...
Listen to the full discussion with Brains Byte Back: sociable.co/business/ai-...
Listen to the full discussion with Brains Byte Back: sociable.co/business/ai-...
Training metrics measure activity. Behavior metrics measure risk reduction.
Measure actions, not just phishing clicks, views, or training completions.
Full report: fablesecurity.com/resources/bl...
Training metrics measure activity. Behavior metrics measure risk reduction.
Measure actions, not just phishing clicks, views, or training completions.
Full report: fablesecurity.com/resources/bl...
Hoping yours are merry, bright, and delightfully low on email. 😉
Hoping yours are merry, bright, and delightfully low on email. 😉
A targeted help-desk impersonation campaign outperformed the general version by 33 points, all thanks to smarter audience matching.
Link to the report below.
#12DaysofRiskmas #Cybersecurity #RiskManagement
A targeted help-desk impersonation campaign outperformed the general version by 33 points, all thanks to smarter audience matching.
Link to the report below.
#12DaysofRiskmas #Cybersecurity #RiskManagement
A truth every security team learns the hard way:
“Send-to-everyone” campaigns barely move the needle.
Day 3 is live now. Download the full report for real-world examples. Link in the comment below.
A truth every security team learns the hard way:
“Send-to-everyone” campaigns barely move the needle.
Day 3 is live now. Download the full report for real-world examples. Link in the comment below.
From weak creds to social engineering, the patterns are consistent. Targeted, timely interventions are the key to reducing risk. Get the full report 👇
From weak creds to social engineering, the patterns are consistent. Targeted, timely interventions are the key to reducing risk. Get the full report 👇
Key findings:
-Targeted > broad campaigns
-Behavior change happens fast
-“Toxic combos” amplify risk
Get the report 👉
#Cybersecurity #HumanRisk #12DaysOfRiskmas
Key findings:
-Targeted > broad campaigns
-Behavior change happens fast
-“Toxic combos” amplify risk
Get the report 👉
#Cybersecurity #HumanRisk #12DaysOfRiskmas
Interested in joining? Check out our open positions: fablesecurity.com/careers/
Interested in joining? Check out our open positions: fablesecurity.com/careers/
Now they don’t. 😉
#Cybersecurity #HumanRisk #SecurityLeadership #FeatureFriday
Now they don’t. 😉
#Cybersecurity #HumanRisk #SecurityLeadership #FeatureFriday
Read our latest post to find the emerging tactics every security leader should know: fablesecurity.com/blog-hackers...
Read our latest post to find the emerging tactics every security leader should know: fablesecurity.com/blog-hackers...
fablesecurity.com/blog-chatgpt...
fablesecurity.com/blog-chatgpt...
Are you interested in joining the Fable team? We’re still hiring! Check us out: fablesecurity.com/careers/
#Cybersecurity #FableSecurity #Hiring
Are you interested in joining the Fable team? We’re still hiring! Check us out: fablesecurity.com/careers/
#Cybersecurity #FableSecurity #Hiring