Blog

Cyber Attack on Emergency Sirens  - HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 7, 156 ALARMS

Cyber Attack on Emergency Sirens – NINJIO SEASON 2, EPISODE 7, 156 ALARMS

Cyber Attack on Emergency Sirens  – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 7, 156 ALARMS In NINJIO’s Season 2, Episode 7, all the sirens in the city of Dallas go off and as a result, an elderly man thinks that the city is being attacked.  He then starts [...]

Read more...
Effective Protection Methods For Email Security

Webinar: Effective Protection Methods For Email Security

Webinar: Effective Protection Methods For Email Security – Malicious emails are one of the most dangerous cybersecurity threats used by cyber hackers. Email security solutions used today alone have failed to prevent these attacks, and email-based attacks have reached an unimaginable power that threatens all organizations. Although new solutions [...]

Read more...
ISO-27001

Keepnet Have Successfully Achieved The ISO/IEC 27001:2013 Certification

After going through the audit process by CFECERT and UKAS, Keepnet has successfully achieved the ISO/IEC 27001:2013 certification – which is one of the highest universally accepted standards for a best-practice information security management system. Thanks to all who helped us with the process. What is ISO 27001 The ISO/IEC 27000 family of [...]

Read more...
Government ICT Conference 2020 (GICTC)

Keepnet Labs Sponsored Government ICT Conference 2020 (GICTC)

We have Sponsored Government ICT Conference 2020 (GICTC) and will be there to make an exhibition to the network of cyber security companies, to evaluate new business opportunities, and to expand our customer network within Turkey. Government ICT Conference will be held on 8th October 2020, coordinated by IT Valley [...]

Read more...
Password Security

PASSWORD SECURITY – HOW IT REALLY HAPPENED: MY PASSWORD IS ‘PASSWORD’

PASSWORD SECURITY  – In NINJIO’s Season 2, Episode 6, we learn how a major corporation’s Twitter account was hacked, sending offensive tweets to customers and driving sales way down. Weak passwords were to blame. But not to worry, there is an easy way to protect your accounts. Using a passphrase instead [...]

Read more...
Phishing Attack Using CAPTCHAs

Phishing Attack Using CAPTCHAs

Phishing attack using CAPTCHAs – Cybercriminals attacked their targets using multiple CAPTCHAs. They installed various CAPTCHAs that Office 365 users have to click on before the phishing page. These attacks have been going on and targeting health care institutions. Criminals have been using visual CAPTCHAs to circumvent exposure and [...]

Read more...
Security Awareness Training

Security Awareness Training

Enable your users to work securely, increase their level of cybersecurity awareness, and defend your organization’s valuable information.  See how our security awareness training programs can decrease the risk of phishing and social engineering attacks. Regarding cşber security awareness training, we think that the training library should be big, interactive, [...]

Read more...
Office 365 Phishing Attack Using Realtime Validation

Office 365 Phishing Attack Using Real-Time Validation

To steal Office 365 login information from users, criminals used a phishing attack that used real-time validation against an institution’s Active Directory. It was reported that the attack was made against an executive of a financial organisation.  The email, along with the subject line “ACH Debit Report,” used spoofing tactics [...]

Read more...