Blog

  • Phishing Test Software

    The human factor is the weakest point in your security posture and may be used against you regardless of how secure your network, computers, and software are. Traditional security measures are insufficient to stop these attacks. Using phishing test platforms that replicate phishing attacks is an effective security measure.

  • Phishing Training for Employees

    Phishing is one of the most successful ways cybercriminals access companies’ passwords and other security credentials. A cybercriminal impersonates a legitimate person or entity and sends a fake email to manipulate employees. Companies need to train their employees not to click on links or attachments in suspicious emails.

  • Protect Yourself Against Keyloggers

    Keyloggers are one of the most common and deadly cybersecurity threats. It is a type of malware that records keystrokes and sends them back to the cybercriminal. Hackers can access accounts, banking systems, or even bitcoin wallets thanks to keyloggers.

  • Email Security Gap Analysis

    Keepnet Labs’ Email Threat Simulator (ETS) allows you to conduct an email gap analysis to quickly assess the effectiveness of your current email security. The ETS is unobtrusive and simple to set up for a comprehensive gap analysis.

  • Create Security Awareness Among Employees By Using Different Phishing Email Templates

    Email has emerged as one of the most popular methods for hackers to attempt to steal sensitive data. Social engineers use manipulative phishing emails which impersonate a legitimate person or institution. They trick people into clicking on fake links to phony websites that influence a computer system with malicious software.

  • Keepnet Phishing Simulator is an Excellent Tool for Fighting Against Phishing Attacks

    Keepnet Labs safely simulates sophisticated phishing attacks within your domain to test and train your employees. Pre-configured or customized phishing attack templates can be administered. The incident responder module makes it simple to report and analyze phishing emails with a single click.

  • All The Phishing Stats You Need

    Predictions and tactics for a more resilient cybersecurity approach may be best guided by numbers and figures. However, they are not always easy to locate when they are required.

    In the hope of assisting the community, this live blog contains an updated list of published phishing reports as well as some significant numbers:

  • New Insight into Cybercrime: Phishing-as-a-Service Platform

    A new report shows that anyone interested in beginning a phishing campaign must pass through an open registration process on ‘Caffeine’. The Caffeine platform has an intuitive interface that it provides to users at a relatively low cost. It can also steal session cookies, which allows the attacker to access accounts without the need for MFA (multi factor authentication) tokens.

  • A New Phishing Threat with Impersonated Pages Targeted Zoom and GitHub Users 

    GitHub Security faced a significant threat from actors targeting GitHub users through their phishing campaign after impersonating CircleCI. Their campaign aimed to harvest two-factor codes and critical user credentials. Many victim organizations were affected even though the security threat did not directly impact them.

  • LinkedIn Scams on the Rise: Beware of Phishing Attacks

    Cybercriminals are increasingly using webmail addresses with LinkedIn display names to send fake emails. Phishing attacks impersonating LinkedIn emails grew by over 230% in February 2022 alone. Over half of all the phishing attacks (52%) for the first half of 2022 tried to leverage LinkedIn.

  • Covert redirect attacks and how to get protected against them

    Open redirects fail to determine whether the redirected URL is valid. Cybercriminals exploit this flaw by opening a fake login window, stealing login information, and redirecting to a malware-infringing page. This type of phishing attack was first discovered in June 2014 by Wang Jing at Nanyang University of Technology.

  • The internet of things (IoT)

    The Internet of Things (IoT) has introduced numerous innovations into our daily lives. According to the World Economic Forum (2015), the number of objects connected to IoT devices will reach 50.1 million by 2020. This figure is expected to rise to 28.4 million in 2017, 34.8 million in 2018, and 42.1m in 2019.

Join
Our Newsletter

Sign up to learn about the latest threats, hacking methods, and news.