Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

How To Know if Your Identity Has Been Stolen

Some signs that indicate your identity may have been stolen include seeing charges you didn’t make on your bank account statement, new inquiries on your credit report, an unusual drop in your credit score, credit checks you didn’t initiate, your credentials being posted on the dark web and more. Continue reading to learn more indications that your identity has been stolen and what to do if you’re a victim.

KeeperPAM Report: Deployment During Economic Uncertainty

Keeper Security has released the second part of a series of Privileged Access Management (PAM) research, Privileged Access Management Survey: Deployment Amid Economic Uncertainty, to understand how IT leaders are approaching, deploying and streamlining their PAM solutions. Keeper surveyed over 400 IT leaders globally, focusing on the impact of the global economic downturn on PAM deployments, and what IT leaders are prioritizing in PAM solutions given the current economic climate.

AI can crack your passwords. Here's how Keeper can help.

As AI becomes more advanced, it’s important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. While AI password-cracking techniques aren’t new, they’re becoming more sophisticated and posing a serious threat to your sensitive data. Thankfully, password managers like Keeper Security exist and can help you stay safe from AI-password threats.

What Is Malvertising?

Malvertising–also called malicious advertising–is when cybercriminals use advertisements to infect devices with malware. Malvertising can appear on any advertisement you see online, you don’t necessarily have to be on a malicious website to be a victim of this cyberthreat. When a victim is exposed to a malvertisement, their device and data are at risk of being compromised, even if they don’t interact with the advertisement.

SAML vs OIDC for Password Manager SSO Integration

Single Sign On (SSO) helps organizations improve their security posture while streamlining the employee login experience. Implementing an SSO platform across your organization is almost always a good idea. However, SSO leaves significant security and functionality gaps that organizations need to be aware of and address. SSO doesn’t cover everything. Many websites, applications, and systems are not included in SSO deployments, and each of those presents a cybersecurity risk.

How To Tell if Someone Hacked Your Router

You can tell if someone has hacked your router if you notice that you can’t log into your router’s admin settings, your browser keeps redirecting you or you receive suspicious activity alerts from your internet service provider, among other signs. Continue reading to learn how someone can hack your router and how you can protect your router from getting hacked going forward.

What Is Call Spoofing?

Call spoofing is when someone, usually a scammer or cybercriminal, disguises their caller ID information to hide who they really are. Call spoofing can also spoof the cybercriminal’s location to make it appear as if the call is coming from a specific location. With call spoofing, the caller will pretend to be someone they’re not to convince the individual to provide them with their personal information.

What Are Common Indicators of a Phishing Attempt?

Common indicators of a phishing attempt include warnings from your email service provider, urgent language, threat of dire consequences, too-good-to-be-true offers and more. Continue reading to learn what to look for to spot phishing attempts and how to keep yourself protected.

What Is a Threat Actor?

A threat actor is an individual or group that purposefully exploits weaknesses in computer systems, networks, devices and individuals for their own benefit. There are many different types of threat actors, with each of them having their own motives and skill levels. Some types of threat actors include cybercriminals, insiders, hacktivists and nation-state threat actors. Continue reading to learn what threat actors do, the tactics they use and how to stay safe from them.