Keepnet – AI-powered human risk management platform logo
Menu
HOME > Blogs

Cybersecurity Blog

Discover the latest in cyber awareness, cybersecurity training, phishing, and ransomware. Get expert advice on managing human cyber risks from Keepnet Labs.

Security Awareness Training
Free Security Awareness Training Library (2026) | PPT & SCORM

Free Security Awareness Training (2026): Videos, Podcasts, PPT & SCORM Library

A free cyber security awareness training library for 2026 with short videos, podcasts, PPT decks, and SCORM packages. Use the pick-your-path guide, train by threat or role, and track outcomes like reporting rate and time-to-report.

Read Nowarrow right icon
Security Awareness Training
AI-Powered Ransomware: Definition, Examples & Prevention

What is AI-Powered Ransomware? Definition, Examples, and Prevention

AI-powered ransomware is ransomware enhanced by AI—used to automate recon, craft convincing lures, adapt payload behavior, and scale extortion. This guide explains what it is, real-world research examples, and a prevention checklist CISOs can use today.

Read Nowarrow right icon
Social Engineering
Malvertising uses online ads and sponsored results to spread malware or scams. Learn how it works, red flags, what to do if exposed, and prevention for teams.

Malvertising (Malicious Advertising): How It Works, Real Examples, and How to Stop It

Malvertising is malicious advertising: attackers buy or inject ads (including Sponsored search ads) that redirect users to malware, scams, or credential theft. Best defenses include cautious handling of Sponsored results, patching, blocking redirects/popups, and layered web + endpoint controls.

Read Nowarrow right icon
Social Engineering
Pop-up phishing uses alerts to steal passwords or money. Learn red flags, what to do if you clicked, and prevention tips for users and teams. Includes 10 FAQs.

Pop-Up Phishing: How to Spot and Stop Fake Alerts (Before You Panic)

Pop-up phishing is the ‘fake alert’ scam that hijacks your screen with urgent warnings like “Virus found!” or “Account locked.” This guide shows real patterns, what to click (and not), and defenses for users and teams—in minutes, no fluff!

Read Nowarrow right icon
Social Engineering
What Is an Account Takeover (ATO) Attack? Definition, Examples & Prevention

What Is an Account Takeover Attack?

Account takeover (ATO) is when criminals hijack online accounts using stolen credentials, session tokens, or MFA bypass tricks. Learn signs, risks, and how to prevent ATO.

Read Nowarrow right icon
Social Engineering
Tabnabbing: What It Is & How to Prevent This Phishing Attack

What Is Tabnabbing? Definition and Protection

Tabnabbing is a phishing trick where an inactive browser tab changes into a fake login page. When you return, you may enter credentials. Protect yourself by checking the URL, using MFA, and closing unused tabs.

Read Nowarrow right icon
Security Awareness Training
Ian McGowan on New Hire Cyber Risk

Ian McGowan on New Hire Cyber Risk

With 25+ years in cyber defense, Ian McGowan has seen one pattern repeat: attackers love new hires. He shares why onboarding is now a critical security layer, and using behavior-led training and phishing simulations to protect new starters from day one.

Read Nowarrow right icon
Security Awareness Training
Nano Awareness Training – Build Daily Cyber Habits for Security Teams

What is Nano Awareness Training?

Nano awareness training breaks down cybersecurity into tiny, on‑the‑job moments that reinforce safe behaviour. Learn how to shift from annual training to always‑on micro‑interventions that reduce human error and strengthen your human risk programme.

Read Nowarrow right icon
Keepnet News
Gartner Names Keepnet a Go-To Vendor Against Deepfakes

Gartner Names Keepnet a Go-To Vendor for Stopping Deepfake and AI Disinformation Attacks

Gartner’s latest research on fighting AI disinformation names Keepnet as a go-to vendor for stopping deepfake and AI-powered social engineering attacks with real-time, behavior-based nudging and human risk–driven training.

Read Nowarrow right icon
12345

Schedule your 30-minute demo now

You'll learn how to:
tickAutomate behaviour-based security awareness training for employees to identify and report threats: phishing, vishing, smishing, quishing, MFA phishing, callback phishing!
tickAutomate phishing analysis by 187x and remove threats from inboxes 48x faster.
tickUse our AI-driven human-centric platform with Autopilot and Self-driving features to efficiently manage human cyber risks.