News

Cyber Attack on Emergency Sirens  - HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 7, 156 ALARMS

Cyber Attack on Emergency Sirens – NINJIO SEASON 2, EPISODE 7, 156 ALARMS

Cyber Attack on Emergency Sirens  – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 7, 156 ALARMS In NINJIO’s Season 2, Episode 7, all the sirens in the city of Dallas go off and as a result, an elderly man thinks that the city is being attacked.  He then starts [...]

Read more...
Government ICT Conference 2020 (GICTC)

Keepnet Labs Sponsored Government ICT Conference 2020 (GICTC)

We have Sponsored Government ICT Conference 2020 (GICTC) and will be there to make an exhibition to the network of cyber security companies, to evaluate new business opportunities, and to expand our customer network within Turkey. Government ICT Conference will be held on 8th October 2020, coordinated by IT Valley [...]

Read more...
The Biggest Data Breaches in the first half of 2020

The Biggest Data Breaches in the first half of 2020

2020 Data Breaches – In this blog, we are going to talk about the big data breach that occurred in the first half of 2020.  Since the COVID-19 pandemic has forced companies to move their business to remote operations, there has been a significant increase in the number of data [...]

Read more...
Ransomware Attack Shut Down School System

Ransomware Attack Shut Down School System

Ransomware Attack Shut Down School System. On the first day of elementary school students starting online classes, the Haywood school system was hit by a ransomware attack. 1. How Ransomware Attack Shut Down School System? The attackers demanded a large amount of money to restore the system, but the ransom amount was not unveiled [...]

Read more...
Malware attacks have increased

Malware Attacks Have Increased 8 Times in the Last 10 Years

Malware attacks have increased 8 times in the last 10 years. Applications and devices must have machine IDs to securely communicate with each other upon authentication. However, whether it is a Kubernetes application or a serverless function in the cloud, machines prefer to use encryption keys and digital certificates used [...]

Read more...
Telephone social engineering

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING In Episode 10, a young finance executive is denied a job after his employer tells him that his credit rating is horrible.  He comes to find out that this was due to an identity theft issue originated by [...]

Read more...
2020 Phishing Trends Report

2020 Phishing Trends Report

In 2020, we identified and analysed 410,000 of phishing email data to reveal the key points forming success of the phishing attacks and published 2020 Phishing Trends Report. This report will help security leaders and IT practitioners gain a better understanding of vulnerable industries and departments against a phishing [...]

Read more...
antiphishing tools and phishing protection software

Phishing Attacks with Legitimate URLs

Contact Keepnet for the best antiphishing tools and phishing protection software! Throughout the years, cybercriminals have become more skilled at escaping the discovery by lurking within benign things and attacking their targets. They essentially utilise of URLs that lead targets to genuine yet compromised websites or have safe-looking redirectors that ultimately [...]

Read more...