RESOURCES

Get the goods

Learn more about human risk management in our resource library.

blog

Emerging threat: Permit lures victims with new invoice fraud scheme

Attackers are using public permit data to send fake fee invoices from lookalike domains. Learn how employees can spot and stop the scam.

blog

Emerging threat: Permit lures victims with new invoice fraud scheme

Attackers are using public permit data to send fake fee invoices from lookalike domains. Learn how employees can spot and stop the scam.

blog

Emerging threat: Permit lures victims with new invoice fraud scheme

Attackers are using public permit data to send fake fee invoices from lookalike domains. Learn how employees can spot and stop the scam.

Latest

Latest

5 questions to ask

Blog

2 Min

Five must-ask questions for security training that changes employee behavior

Five must-ask questions for security awareness training that changes employee behavior—not just compliance checkboxes.

Blog, Emerging threats

3 Min

Emerging threat: Facebook ads push fake Windows 11 update to steal passwords, crypto

Facebook ads promote a fake free Windows 11 update that steals passwords, session tokens, and crypto. See how these malvertising lures work.

Blog, Emerging threats

3 Min

Emerging threat: Attackers combo voice and email phishing for a credential knock-out

Scammers now pair phishing emails with fake IT calls to walk victims through MFA and steal credentials from Google, Microsoft, Okta, and crypto users.

Blog, Emerging threats

3 Min

Emerging threat: LastPass “Backup Recommended” phishing email

Attackers used urgent "backup recommended" LastPass phishing emails over holiday weekend to steal master passwords. Here’s why the lure worked.

Blog

2 Min

We wrote the book on modern human risk management

Cybersecurity has modernized everywhere except the human layer. This book introduces modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

Blog, Case study

2 Min

From annual training to real impact: Pennymac’s modern approach to security awareness

Pennymac shares how Fable’s AI-driven, role-based training improved engagement, changed behavior, and helped the security team respond faster to real-world risk.

Go to page
Go

Eyebrow

Get fresh insights every week.

Vestibulum id ligula porta felis euismod semper.