Cybersecurity Blog
Discover the latest in cyber awareness, cybersecurity training, phishing, and ransomware. Get expert advice on managing human cyber risks from Keepnet Labs.
What Is an Account Takeover Attack?
Account takeover (ATO) is when criminals hijack online accounts using stolen credentials, session tokens, or MFA bypass tricks. Learn signs, risks, and how to prevent ATO.
Read NowWhat Is Tabnabbing? Definition and Protection
Tabnabbing is a phishing trick where an inactive browser tab changes into a fake login page. When you return, you may enter credentials. Protect yourself by checking the URL, using MFA, and closing unused tabs.
Read NowIan McGowan on New Hire Cyber Risk
With 25+ years in cyber defense, Ian McGowan has seen one pattern repeat: attackers love new hires. He shares why onboarding is now a critical security layer, and using behavior-led training and phishing simulations to protect new starters from day one.
Read NowWhat is Nano Awareness Training?
Nano awareness training breaks down cybersecurity into tiny, on‑the‑job moments that reinforce safe behaviour. Learn how to shift from annual training to always‑on micro‑interventions that reduce human error and strengthen your human risk programme.
Read NowGartner Names Keepnet a Go-To Vendor for Stopping Deepfake and AI Disinformation Attacks
Gartner’s latest research on fighting AI disinformation names Keepnet as a go-to vendor for stopping deepfake and AI-powered social engineering attacks with real-time, behavior-based nudging and human risk–driven training.
Read NowInsights from Magic Quadrant for Email Security 2025
This guide unpacks Magic Quadrant for Email Security 2025, explains what the report covers, and shows how to use its findings to choose the right email security platform and human risk programme.
Read NowWhat Is Chatbot Poisoning? Risks, Detection & Protection
Discover how chatbot poisoning, a rising AI security threat affecting organizations in 2025, can silently compromise your LLM applications, and what you can do to defend against it.
Read NowWhat is Shadow AI?
Shadow AI use is rising fast—and so are the risks. This blog explains what Shadow AI is, why employees use it, and how IT leaders can detect and govern it effectively.
Read NowWhat Is Doodles Security Training and How Does It Work?
What is Doodles Security Training? It’s a visual microlearning approach that turns security policies into engaging stories employees remember and act on.
Read Now