Keepnet Labs Logo
Menu
HOME > Blogs

Cybersecurity Blog

Discover the latest in cyber awareness, cybersecurity training, phishing, and ransomware. Get expert advice on managing human cyber risks from Keepnet Labs.

Social Engineering
What Is an Account Takeover (ATO) Attack? Definition, Examples & Prevention

What Is an Account Takeover Attack?

Account takeover (ATO) is when criminals hijack online accounts using stolen credentials, session tokens, or MFA bypass tricks. Learn signs, risks, and how to prevent ATO.

Read Nowarrow right icon
Social Engineering
Tabnabbing: What It Is & How to Prevent This Phishing Attack

What Is Tabnabbing? Definition and Protection

Tabnabbing is a phishing trick where an inactive browser tab changes into a fake login page. When you return, you may enter credentials. Protect yourself by checking the URL, using MFA, and closing unused tabs.

Read Nowarrow right icon
Security Awareness Training
Ian McGowan on New Hire Cyber Risk

Ian McGowan on New Hire Cyber Risk

With 25+ years in cyber defense, Ian McGowan has seen one pattern repeat: attackers love new hires. He shares why onboarding is now a critical security layer, and using behavior-led training and phishing simulations to protect new starters from day one.

Read Nowarrow right icon
Security Awareness Training
Nano Awareness Training – Build Daily Cyber Habits for Security Teams

What is Nano Awareness Training?

Nano awareness training breaks down cybersecurity into tiny, on‑the‑job moments that reinforce safe behaviour. Learn how to shift from annual training to always‑on micro‑interventions that reduce human error and strengthen your human risk programme.

Read Nowarrow right icon
Keepnet News
Gartner Names Keepnet a Go-To Vendor Against Deepfakes

Gartner Names Keepnet a Go-To Vendor for Stopping Deepfake and AI Disinformation Attacks

Gartner’s latest research on fighting AI disinformation names Keepnet as a go-to vendor for stopping deepfake and AI-powered social engineering attacks with real-time, behavior-based nudging and human risk–driven training.

Read Nowarrow right icon
Human Risk Management
Insights from Magic Quadrant for Email Security 2025

Insights from Magic Quadrant for Email Security 2025

This guide unpacks Magic Quadrant for Email Security 2025, explains what the report covers, and shows how to use its findings to choose the right email security platform and human risk programme.

Read Nowarrow right icon
Security Awareness Training
What Is Chatbot Poisoning? Risks, Detection & Protection

What Is Chatbot Poisoning? Risks, Detection & Protection

Discover how chatbot poisoning, a rising AI security threat affecting organizations in 2025, can silently compromise your LLM applications, and what you can do to defend against it.

Read Nowarrow right icon
Human Risk Management
What Is Shadow AI? Understanding Risks & How to Manage It

What is Shadow AI?

Shadow AI use is rising fast—and so are the risks. This blog explains what Shadow AI is, why employees use it, and how IT leaders can detect and govern it effectively.

Read Nowarrow right icon
Security Awareness Training
What Is Doodles Security Training and How Does It Work?

What Is Doodles Security Training and How Does It Work?

What is Doodles Security Training? It’s a visual microlearning approach that turns security policies into engaging stories employees remember and act on.

Read Nowarrow right icon
12345

Schedule your 30-minute demo now

You'll learn how to:
tickAutomate behaviour-based security awareness training for employees to identify and report threats: phishing, vishing, smishing, quishing, MFA phishing, callback phishing!
tickAutomate phishing analysis by 187x and remove threats from inboxes 48x faster.
tickUse our AI-driven human-centric platform with Autopilot and Self-driving features to efficiently manage human cyber risks.