Blog
Articles on cyber-security and latest trends
FEATURED POSTS

How Effective Is Security Training in Preventing Cyber Attacks?

Do your security controls work?
-
Phishing Test Software
The human factor is the weakest point in your security posture and may be used against you regardless of how secure your network, computers, and software are. Traditional security measures are insufficient to stop these attacks. Using phishing test platforms that replicate phishing attacks is an effective security measure.
-
Phishing Training for Employees
Phishing is one of the most successful ways cybercriminals access companies’ passwords and other security credentials. A cybercriminal impersonates a legitimate person or entity and sends a fake email to manipulate employees. Companies need to train their employees not to click on links or attachments in suspicious emails.
-
Protect Yourself Against Keyloggers
Keyloggers are one of the most common and deadly cybersecurity threats. It is a type of malware that records keystrokes and sends them back to the cybercriminal. Hackers can access accounts, banking systems, or even bitcoin wallets thanks to keyloggers.
-
Email Security Gap Analysis
Keepnet Labs’ Email Threat Simulator (ETS) allows you to conduct an email gap analysis to quickly assess the effectiveness of your current email security. The ETS is unobtrusive and simple to set up for a comprehensive gap analysis.
-
Create Security Awareness Among Employees By Using Different Phishing Email Templates
Email has emerged as one of the most popular methods for hackers to attempt to steal sensitive data. Social engineers use manipulative phishing emails which impersonate a legitimate person or institution. They trick people into clicking on fake links to phony websites that influence a computer system with malicious software.
-
Keepnet Phishing Simulator is an Excellent Tool for Fighting Against Phishing Attacks
Keepnet Labs safely simulates sophisticated phishing attacks within your domain to test and train your employees. Pre-configured or customized phishing attack templates can be administered. The incident responder module makes it simple to report and analyze phishing emails with a single click.
-
All The Phishing Stats You Need
Predictions and tactics for a more resilient cybersecurity approach may be best guided by numbers and figures. However, they are not always easy to locate when they are required.
In the hope of assisting the community, this live blog contains an updated list of published phishing reports as well as some significant numbers:
-
New Insight into Cybercrime: Phishing-as-a-Service Platform
A new report shows that anyone interested in beginning a phishing campaign must pass through an open registration process on ‘Caffeine’. The Caffeine platform has an intuitive interface that it provides to users at a relatively low cost. It can also steal session cookies, which allows the attacker to access accounts without the need for MFA (multi factor authentication) tokens.
-
A New Phishing Threat with Impersonated Pages Targeted Zoom and GitHub Users
GitHub Security faced a significant threat from actors targeting GitHub users through their phishing campaign after impersonating CircleCI. Their campaign aimed to harvest two-factor codes and critical user credentials. Many victim organizations were affected even though the security threat did not directly impact them.
-
LinkedIn Scams on the Rise: Beware of Phishing Attacks
Cybercriminals are increasingly using webmail addresses with LinkedIn display names to send fake emails. Phishing attacks impersonating LinkedIn emails grew by over 230% in February 2022 alone. Over half of all the phishing attacks (52%) for the first half of 2022 tried to leverage LinkedIn.
-
Covert redirect attacks and how to get protected against them
Open redirects fail to determine whether the redirected URL is valid. Cybercriminals exploit this flaw by opening a fake login window, stealing login information, and redirecting to a malware-infringing page. This type of phishing attack was first discovered in June 2014 by Wang Jing at Nanyang University of Technology.
-
The internet of things (IoT)
The Internet of Things (IoT) has introduced numerous innovations into our daily lives. According to the World Economic Forum (2015), the number of objects connected to IoT devices will reach 50.1 million by 2020. This figure is expected to rise to 28.4 million in 2017, 34.8 million in 2018, and 42.1m in 2019.






