Keepnet Labs Logo
Keepnet Labs > blog > cybersecurity-in-the-spotlight-unraveling-the-mgm-resort-breach

Cybersecurity in the Spotlight: Unraveling the MGM Resorts Breach and the Rise of Social Engineering Attacks

The digital landscape has recently witnessed a surge in cyberattacks targeting high-profile entities. One such incident that sent shockwaves through the cybersecurity community was the breach at MGM Resorts.

a long hallway with rows of servers in the background

1. Introduction

The digital landscape has recently witnessed a surge in cyberattacks targeting high-profile entities. One such incident that sent shockwaves through the cybersecurity community was the breach at MGM Resorts, a renowned name in the hospitality and entertainment sector. This incident not only underscored the vulnerabilities inherent in even the most fortified digital infrastructures but also highlighted the evolving tactics employed by cybercriminals.

With its sprawling properties, luxurious accommodations, and a reputation for delivering unparalleled experiences, MGM Resorts found itself at the epicenter of a cybersecurity storm. The attack was not the result of intricate code or sophisticated malware but was facilitated through a method as old as deception: social engineering. This technique, which relies on manipulating individuals into divulging confidential information, proved to be the Achilles' heel for a corporation valued at billions.

The incident at MGM Resorts began innocuously enough. An employee whose details were available on the professional networking site LinkedIn became the unsuspecting target. This choice of target is a testament to the meticulous planning of the attackers. LinkedIn, a platform where professionals showcase their achievements, roles, and responsibilities, became the starting point of a chain of events culminating in a significant breach.

Social engineering, in the context of information security, refers to the psychological manipulation of individuals to perform specific actions or divulge confidential information. It's not about exploiting software or hardware vulnerabilities but human vulnerabilities. In the case of MGM Resorts, the attackers didn't need to hack into systems or bypass firewalls. Instead, they capitalized on human trust, curiosity, and sometimes fear. A simple conversation, a seemingly innocent request, and the vast digital empire of MGM Resorts were compromised.

This incident is a stark reminder of the multifaceted nature of cybersecurity threats in the modern age. While organizations invest heavily in state-of-the-art security infrastructure, firewalls, and intrusion detection systems, the human element remains the most unpredictable and, often, the most vulnerable. The MGM Resorts incident underscores the need for comprehensive cybersecurity strategies encompassing technological solutions and human-centric approaches.

The MGM Resorts cybersecurity incident is a clarion call for organizations worldwide. It emphasizes that technology alone is not the panacea in the battle against cyber threats. A holistic approach, combining robust digital defenses with continuous employee training and awareness, is imperative. The role of social engineering in this attack is a testament to the evolving and adaptive nature of cyber threats, urging us to be ever-vigilant and proactive in our defenses.

2. The Attack's Origin

The MGM Resorts breach stands out for its simplicity and audacity. The origin of this attack can be traced back to a seemingly harmless platform: LinkedIn. This professional networking site, designed for career advancement and networking, inadvertently became the launchpad for one of the recent most significant cybersecurity breaches.

The attackers, demonstrating a keen understanding of human psychology and behavior, identified an MGM Resorts employee on LinkedIn. Instead of targeting high-ranking executives or IT personnel, who might be more cautious and trained against such threats, they zeroed in on an unsuspecting employee. This choice was strategic. Everyday employees, often overlooked in the grand scheme of cybersecurity protocols, can possess access credentials or information that can serve as a gateway to an organization's digital infrastructure.

Once the employee was identified, the attackers employed social engineering tactics. Social engineering, often underestimated in its potency, is a method where cybercriminals manipulate individuals into revealing confidential information or performing specific actions that compromise security. It's a game of trust, deceit, and manipulation. In the MGM Resorts scenario, the attackers didn't need to break through layers of digital security or decode encrypted data. They simply had to convince, deceive, or manipulate the right person.

The details of this breach came to light through vx-underground, a reputable malware repository and source code site. With established relationships within the dark corners of the cyber world, vx-underground has connections with various threat actors, giving them insights into the modus operandi of such groups. Their revelations about the MGM Resorts attack not only shed light on the incident but also highlighted cybercriminals' evolving tactics and strategies.

Vx-underground's involvement in unveiling the details of the attack underscores the importance of such platforms in the cybersecurity ecosystem. While they operate in the shadows, documenting and analyzing malware and cyber threats, their work is crucial in understanding and countering the ever-evolving world of cyber threats. Their insights provide information to security professionals, organizations, and individuals, helping them stay one step ahead of potential threats.

The origin of the MGM Resorts attack serves as a cautionary tale for organizations and individuals alike. It emphasizes that threats can emerge from the most unexpected sources and that every link in the organizational chain, from the CEO to the newest employee, is a potential vulnerability. The revelations by vx-underground further highlight the need for a collaborative approach in cybersecurity, where information sharing and collective vigilance are paramount in thwarting future attacks.

3. Impact of the Attack

With its vast interconnected networks, the digital realm has brought about unprecedented convenience and efficiency. However, when these networks are compromised, the ripple effects can be far-reaching and devastating. The MGM Resorts cyberattack serves as a testament to this, with its impact reverberating across the glitzy boulevards of Las Vegas and beyond.

One of the attack's most immediate and tangible effects was seen in the heart of Las Vegas's entertainment world: the casinos. Slot machines, the iconic symbols of Vegas's gambling culture, went silent in some of the city's most prominent establishments. For visitors, this meant a disruption in their entertainment, a break in the rhythm of the flashing lights and the jingling of coins. It translated into significant financial losses for the casinos, given that slot machines are a major revenue source. Even if temporary, the silence of these machines echoed the severity of the breach and its real-world implications.

But the impact didn't stop at the casino floors. The digital facades of some of the most illustrious names in the hospitality industry were affected. The websites of the Aria, Bellagio, Mandalay Bay, and MGM Grand, all pillars of luxury and opulence, were taken offline. In today's digital age, a hotel's online presence is not just a portal for information but a critical channel for reservations, customer interactions, and brand engagement. With these websites going dark, potential visitors were left in limbo, unsure of their bookings or unable to make new ones. For the hotels, this meant potential revenue losses, disrupted operations, and a dent in their reputation.

Beyond the immediate financial implications, the attack's impact on MGM Resorts' brand image and customer trust is immeasurable. In an industry where reputation is everything and customer trust is painstakingly built over the years, such incidents can have long-lasting repercussions. Potential guests might think twice before booking, questioning the establishment's digital security and the safety of their personal information.

In a broader context, the attack on MGM Resorts underscores the vulnerabilities inherent in our digital-first world. It serves as a stark reminder to businesses, irrespective of their size or domain, of the importance of robust cybersecurity measures. It emphasizes that a breach in one node in the interconnected digital landscape can have cascading effects, disrupting operations, affecting revenues, and tarnishing reputations.

The impact of the MGM Resorts cyberattack was not just limited to its digital infrastructure but had tangible, real-world consequences. It's a cautionary tale for all, highlighting the intricate interplay between the digital and physical realms and their vulnerabilities.

4. Details of the Attack

Delving into the details reveals a chilling narrative of how human vulnerabilities can be exploited, leading to catastrophic consequences for even the most fortified institutions.

The perpetrators behind this audacious breach were identified as the ALPHV ransomware group. Their modus operandi did not involve sophisticated hacking tools or intricate malware. Instead, they turned to the world's largest professional network: LinkedIn. They meticulously scoured profiles here, eventually zeroing in on an MGM Resorts employee. This choice of target was strategic. They found their potential entry point by selecting an individual who might have access to critical systems but might not be on the highest alert against cyber threats.

With the target identified, the next step was initiation. The group reached out not through covert channels or encrypted messages but through a straightforward method: a call to the Help Desk. This seemingly innocuous conversation, lasting a mere 10 minutes, was all it took to compromise the digital defenses of MGM Resorts, a company with a staggering valuation of $33.9 billion. The brevity of this interaction juxtaposed with its profound consequences underscores the potency of social engineering tactics.

Digging deeper into the attackers' identity, suspicions arose linking the breach to an English-speaking cybercriminal faction associated with ALPHV. This group, known by the monikers BlackCat and Scattered Spider, has a notorious reputation in the cyber underworld. Their signature style combines technical prowess and psychological manipulation, making them formidable adversaries. While not conclusively proven, their association with this attack aligns with their known tactics and previous operations.

Digging deeper into the attackers' identity, suspicions arose linking the breach to an English-speaking cybercriminal faction associated with ALPHV. This group, known by the monikers BlackCat and Scattered Spider, has a notorious reputation in the cyber underworld. Their signature style combines technical prowess and psychological manipulation, making them formidable adversaries. While not conclusively proven, their association with this attack aligns with their known tactics and previous operations.

The details of the MGM Resorts attack paint a picture of the evolving landscape of cyber threats. It's a world where human psychology is as much a weapon as code, trust can be a vulnerability, and even the most innocuous interactions can have profound implications. The story of this breach serves as a stark reminder of the multifaceted nature of cyber threats and the need for vigilance at every level of an organization.

5. Previous Targets of ALPHV/BlackCat

ALPHV, also known as BlackCat, stands out for its audacity, precision, and the high-profile nature of its targets. Their modus operandi, while varied, often hinges on exploiting human vulnerabilities, making them a unique and formidable threat in the cyber landscape.

One of the most striking aspects of ALPHV/BlackCat's operations is the caliber of their targets. These aren't small, vulnerable entities but major corporations with presumably robust cybersecurity measures. A look at their track record reveals a pattern of ambitious attacks:

5.1. Constellation Software

A titan in the software industry, Constellation Software's vast portfolio and global operations make it a lucrative target. The breach of such a major player underscores ALPHV/BlackCat's technical prowess and ability to navigate complex digital infrastructures.

5.2. Estée Lauder

A household name in the world of cosmetics and beauty, Estée Lauder's breach was a stark reminder that no sector is immune. With a vast customer base and a treasure trove of personal and financial data, the implications of such an attack are far-reaching.

5.3. Sun Pharmaceuticals

As one of the world's leading pharmaceutical companies, Sun Pharmaceuticals holds critical data related to medicines, research, and patient information. The breach of such an entity raises concerns about data theft and the potential misuse of sensitive medical information.

5.4. Western Digital

Western Digital's breach was particularly alarming as a giant in data storage solutions. Given the nature of their products and services, a breach could potentially grant access to vast amounts of stored data, with ramifications for countless individuals and businesses.

While ALPHV/BlackCat has been directly linked to these attacks, their suspected affiliate, Scattered Spider, has its tactics. Known for initiating attacks via SMS phishing and social engineering vishing calls, Scattered Spider adds another layer of complexity to the threat landscape. While seemingly old-school, their methods are effective, capitalizing on human trust and increasing reliance on mobile communications.

The previous targets of ALPHV/BlackCat and the tactics of Scattered Spider highlight a grim reality: In the world of cyber threats, no entity, regardless of its size or sector, is safe. Their operations underscore the need for continuous vigilance, regular cybersecurity updates, and, most importantly, educating individuals about the ever-evolving tactics of cybercriminals.

6. Techniques Used in the Attack

Attackers devise new strategies, and defenders scramble to counteract them. The MGM Resorts breach, orchestrated by the ALPHV ransomware group, is a testament to the effectiveness of age-old tactics, particularly social engineering, in the modern digital age.

While vx-underground, the primary source of information on this breach, did not provide an exhaustive breakdown of the exact techniques used, the broad strokes paint a picture of a meticulously planned and executed operation. The cornerstone of this attack was social engineering, a method that capitalizes on human behavior, trust, and psychology rather than technical vulnerabilities.

6.1. Pretending to be IT Support

One of the most commonly employed tactics in social engineering attacks is impersonating IT support. Armed with just enough information (often gleaned from platforms like LinkedIn), Attackers reach out to employees under the guise of addressing a technical issue. By creating a sense of urgency or concern, they manipulate employees into granting remote access to systems or divulging sensitive information. This tactic often proves effective since employees are conditioned to trust and cooperate with IT support.

6.2. Typo-Squatted Domains and Phishing Emails

Another technique that has gained traction among cybercriminals is using typo-squatted domains. These domains closely resemble legitimate ones but might have slight misspellings or variations. Attackers use these domains to send phishing emails that appear genuine. For instance, an email from 'mgmresorts.co' instead of 'mgmresorts.com' might go unnoticed by an unsuspecting recipient. These emails often contain malicious links or attachments, or they might request sensitive information under a plausible pretext.

6.3. Leveraging Existing Communications

Attackers sometimes gain access to communication channels, such as mail servers. This allows them to send and receive emails from legitimate or closely mimicked addresses, adding a layer of authenticity to their deceit. They can intercept genuine requests, respond to them, and even initiate conversations, all while posing as a trusted entity.

The techniques employed in the MGM Resorts attack underscore a critical aspect of cybersecurity: the human element is often the weakest link. While technology has advanced leaps and bounds, human psychology remains relatively constant. Trust, fear, urgency, and curiosity are emotions that can be easily manipulated, and attackers know this all too well.

The MGM Resorts breach serves as a stark reminder that while technological defenses are crucial, educating and training individuals to recognize and resist social engineering tactics is equally, if not more, important.

7. Recent Similar Incidents

While offering unprecedented opportunities for growth and connectivity, the digital landscape is also fraught with vulnerabilities. The MGM Resorts breach is one in a series of recent cyber incidents highlighting the evolving and adaptive nature of cyber threats. Two other notable incidents underscore the multifaceted challenges organizations face in ensuring cybersecurity.

7.1. Domain Expiration Leading to Unauthorized Access

In a startling revelation, a security researcher gained access to thousands of emails from a Fortune 500 company, not through sophisticated hacking techniques, but due to an oversight as simple as domain expiration. Domains are the digital addresses of companies on the internet, and their expiration can sometimes be overlooked, especially if they pertain to subsidiary operations or older campaigns.

In this incident, the company used a secondary domain for email communications. Upon its expiration, the researcher seized the opportunity, took control of the domain, and set up a catch-all email. This allowed them to receive every email sent to that domain, granting them access to sensitive information, including names, company details, phone numbers, order numbers, delivery addresses, and customer queries. The incident underscores the importance of meticulous digital asset management and the potential risks of seemingly minor oversights.

7.2. Lapsus$ Threat Group's Multi-Faceted Attacks

Another group that has made headlines in the cybersecurity world is Lapsus$. Known for their audacity and effectiveness, this group has successfully bypassed Multi-Factor Authentication (MFA), a security measure considered robust by industry standards. MFA, which requires users to provide multiple forms of identification before granting access, is a significant deterrent to unauthorized access.

However, Lapsus$ demonstrated that even such defenses could be rendered ineffective with the right tactics. Their strategy often involves a combination of social engineering attacks, where they manipulate individuals into divulging sensitive information or performing specific actions. The group's success, especially against well-established security measures, highlights the evolving nature of cyber threats and the need for continuous adaptation and vigilance on the part of organizations.

These recent incidents and the MGM Resorts breach paint a sobering picture of the current cybersecurity landscape. They emphasize that while technological defenses are essential, they are not foolproof. Constant vigilance, regular updates, employee training, and a holistic approach to security are imperative in the face of ever-evolving threats.

8. Recommendations and Solutions

While ushering in many opportunities, the digital age has brought forth a myriad of cybersecurity challenges. Recent cyberattacks, such as the MGM Resorts breach, underscore the vulnerabilities that even the most fortified institutions face. Addressing these challenges requires a multi-faceted approach, combining technological solutions with human-centric strategies.

The US “Cyber Safety Review Board” has been at the forefront of advocating for robust cybersecurity measures. One of their primary recommendations is the integration of strong authentication capabilities. By ensuring that users provide multiple forms of verification before accessing systems, the efficacy of social engineering attacks can be significantly reduced. For instance, multi-factor authentication (MFA) has emerged as a reliable deterrent against unauthorized access. However, as recent incidents have shown, even MFA isn't infallible.

This brings us to a critical aspect of cybersecurity: the human element. While essential, technological defenses are only as strong as those who use them. Regularly educating employees about the latest threat landscape is paramount. This keeps them updated on potential risks and equips them with the knowledge to identify and counteract threats. Workshops, training sessions, and regular briefings can ensure that employees remain vigilant and informed.

Creating a security-centric organizational culture is another pivotal recommendation. Employees should be encouraged to report anomalies, potential intrusions, or suspicious activities. A culture that rewards vigilance and promotes open communication can act as a first line of defense against cyber threats. Training programs should also focus on creative social engineering attacks, ensuring employees can identify and respond effectively.

However, in light of the evolving nature of threats, it's crucial to go a step further. Organizations are advised to invest in an extended human risk management platform. Such platforms offer a comprehensive suite of tools to simulate real-world cyber threats. Features like vishing simulation, smishing simulation, MFA simulation, password phishing, quishing simulator, and various other social engineering simulations can provide employees with hands-on experience in tackling threats. By exposing them to simulated threats in a controlled environment, they can better understand the nuances of different attacks and develop strategies to counteract them.

The cybersecurity landscape is in a state of constant flux. As threats evolve, so must our defenses. A combination of robust technological solutions, continuous employee education, and advanced simulation platforms can ensure that organizations remain one step ahead of potential cyber adversaries. The goal is not just to react to threats but to proactively anticipate and neutralize them.

9. Current Status of MGM Resorts

In the aftermath of a cyberattack, the recovery process for any organization is multifaceted, involving technical remediation and public relations efforts to restore trust and confidence. For MGM Resorts, a titan in the hospitality and entertainment industry, the repercussions of the breach have been palpable, affecting both their digital presence and their communication with patrons.

As of now, the digital footprint of MGM Resorts exhibits a mixed picture. The websites for some of their most iconic venues, including the MGM Grand and Aria, remain offline. This disruption, while indicative of the severity of the breach, also suggests a cautious approach by the company. Keeping these sites offline might be a strategic decision to ensure comprehensive security assessments, patching of vulnerabilities, and fortification against potential future attacks. For potential visitors and patrons, this means a temporary halt in online reservations, inquiries, and other digital interactions with these specific venues.

However, it's not all bleak for MGM Resorts in the digital realm. The MGM rewards application remains operational, a critical touchpoint for loyal customers, and a hub for promotions, bookings, and updates. This suggests that while some parts of MGM's digital infrastructure were affected, others remain intact, allowing continued engagement with their clientele.

Beyond the digital landscape, MGM Resorts has proactively assured patrons and stakeholders about the on-ground situation. The company has emphasized that, despite the cyber challenges, their resorts are functioning normally. This is a crucial message, conveying that the guest experience remains unaffected, a cornerstone of MGM Resorts' reputation. Even as the company grapples with the cyber aftermath, guests can still expect the luxury, entertainment, and hospitality MGM is renowned for.

The current status of MGM Resorts paints a picture of resilience and recovery. While the digital disruptions are evident, the company's commitment to ensuring a seamless guest experience remains unwavering. As they navigate the complexities of cybersecurity remediation, their focus on patrons, both in the digital and physical realms, underscores their dedication to excellence and trustworthiness. It's a reminder that in the face of adversity, an organization's core values and commitments shine through.

10. Conclusion

The MGM Resorts cyberattack serves as a poignant reminder of modern cybersecurity's intricate and often unpredictable landscape. In an era where digital fortifications are more advanced than ever, the breach underscores a paradoxical truth: while technology has evolved leaps and bounds, human vulnerabilities remain a consistent weak link. Even behemoths, with their vast resources and state-of-the-art security infrastructures, are not immune to the age-old deception and manipulation tactics.

Social engineering attacks, like those targeting MGM Resorts, exploit these human vulnerabilities. They bypass the digital walls not through codes or malware but by tapping into emotions, trust, and psychology. The success of such attacks on large corporations is a testament to their potency. It emphasizes that cybersecurity is not just a technical challenge but a human one. No matter how fortified the digital defenses are, a single lapse in judgment, a momentary distraction, or a misplaced trust can lead to monumental breaches.

This brings us to a critical realization: the importance of continuous employee training. While firewalls, encryption, and intrusion detection systems are crucial, they must be complemented by a well-informed and vigilant workforce. Regular training sessions, workshops, and simulations can equip employees with the knowledge and skills to recognize and counteract potential threats. They can be the first line of defense, identifying anomalies, reporting suspicious activities, and ensuring they don't inadvertently become breach conduits.

Moreover, the incident underscores the need for robust and holistic cybersecurity measures. Organizations must adopt a multi-layered approach, combining technological solutions with human-centric strategies. This includes advanced digital defenses and tools that simulate real-world threats, allowing employees to experience and tackle them in controlled environments.

The MGM Resorts incident is both a cautionary tale and a call to action. It emphasizes cyber threats' ever-present and evolving nature and the need for continuous adaptation and vigilance. As technology advances and the digital realm expands, the human element remains constant. Ensuring that this human element is equipped, informed, and vigilant is the key to fortifying our digital future against potential threats.

11. Next Steps

Protecting your organization extends beyond hardware and software; it's about safeguarding the human element. Keepnet Labs presents an Extended Human Risk Management Platform , meticulously crafted to bolster the defenses of your organization's most crucial yet vulnerable component: its people. With specialized tools like the Smishing Simulator , MFA Phishing Simulator , Phishing Simulator , Vishing Simulator , and Quishing Simulator , Keepnet Labs offers a holistic approach to cybersecurity. Coupled with the world's largest cybersecurity training library , they ensure your team is well-equipped to recognize and neutralize various threats.

Are you curious how this platform can revolutionize your organization's cybersecurity approach? Dive into a free trial offered by Keepnet Labs. For a more tailored experience, they also provide a one-to-one demo , ensuring you grasp the full potential of their solutions. With Keepnet Labs, empower your team to be the frontline defense against evolving cyber threats.

SHARE ON

twitter
twitter
twitter

Frequently Asked Questions

What was the origin of the MGM Resorts cyberattack, and how did it start?

The origin of the MGM Resorts cyberattack can be traced back to LinkedIn, where the attackers identified an unsuspecting employee to exploit through social engineering tactics. They contacted this employee to gain access to MGM Resorts' digital infrastructure.

How did the MGM Resorts cyberattack impact the organization and its operations?

The attack had significant real-world consequences, including disruptions in casino operations, website downtime for key venues, potential financial losses, and damage to the brand's image and customer trust.

What techniques were used in the MGM Resorts cyberattack, particularly in social engineering?

The attackers used social engineering techniques, including impersonating IT support, utilizing typo-squatted domains and phishing emails, and leveraging existing communications channels to manipulate employees into revealing sensitive information or granting access to systems.

Are there recent similar incidents to the MGM Resorts breach, and what can we learn from them?

There have been recent incidents like the MGM Resorts breach, including one involving domain expiration leading to unauthorized access and another by the Lapsus$ threat group bypassing Multi-Factor Authentication (MFA). These incidents highlight the need for vigilance and continuous adaptation to evolving cyber threats.

What is the current status of MGM Resorts in the aftermath of the cyberattack?

MGM Resorts has taken measures to address the breach, including keeping some of its websites offline for security assessments and ensuring the guest experience remains unaffected. The organization is committed to maintaining its reputation for excellence and trustworthiness.

Can you provide more details about ALPHV/BlackCat's previous targets, and what lessons can organizations learn from these attacks?

ALPHV/BlackCat has targeted major corporations, including Constellation Software, Estée Lauder, Sun Pharmaceuticals, and Western Digital. These attacks emphasize that no entity, regardless of its size or sector, is immune to cyber threats. Organizations should remain vigilant, regularly update their cybersecurity measures, and educate individuals about evolving tactics used by cybercriminals.

How does social engineering differ from traditional hacking methods?

Social engineering exploits human vulnerabilities through manipulation and deception, bypassing technical defenses, whereas traditional hacking targets system vulnerabilities directly.

What is the Extended Human Risk Management Platform offered by Keepnet Labs?

Keepnet Labs' Extended Human Risk Management Platform is a comprehensive solution designed to educate and prepare employees against real-world cyber threats, emphasizing the human element in cybersecurity.

How can the Smishing Simulator from Keepnet Labs benefit my organization?

The Smishing Simulator mimics SMS-based phishing attacks, training employees to recognize and respond to such threats and reducing the risk of data breaches via text messages.

Why is a Multi-Factor Authentication (MFA) Simulator crucial for modern businesses?

The MFA Simulator by Keepnet Labs helps organizations test and strengthen their multi-factor authentication processes, ensuring that employees can identify and counteract bypass attempts.

How does the Phishing Simulator enhance employee cybersecurity awareness?

Keepnet Labs' Phishing Simulator replicates real-world phishing emails, training employees to spot and report malicious email content fortifying an organization's email defense.

What unique features does the Vishing Simulator offer?

The Vishing Simulator emulates voice phishing attacks, enabling employees to recognize deceptive calls and safeguard sensitive information over the phone.

Can the Quishing Simulator help in preventing QR code-based threats?

Absolutely. Keepnet Labs' Quishing Simulator replicates QR code-based phishing threats, ensuring employees are vigilant when scanning QR codes and can discern between legitimate and malicious content.

How extensive is Keepnet Labs' cybersecurity training library?

Keepnet Labs boasts the world's largest cybersecurity training library, offering various modules covering various threats ensuring comprehensive employee training.

How can I experience Keepnet Labs' platform firsthand?

Keepnet Labs offers a free trial for organizations to explore their platform's capabilities. A personalized one-to-one demo is also available for a more tailored experience, showcasing the platform's adaptability to specific organizational needs.

Get Your Private Demo Session

Book a free 30-minute demo call with our experts and discover how we can help you manage human risk in your organization.

iso 27017 certificate
iso 27018 certificate
iso 27001 certificate
ukas 20382 certificate
Cylon certificate
Crown certificate
Gartner certificate
Tech Nation certificate