Topics

Understanding Security Support Scams: A Comprehensive Analysis
Key Topics and Findings: Overview In today’s interconnected world where practically all employees use the internet, the prevalence of security support scams and other social

From Google Search to Microsoft Security Scam
Key Findings: Overview Keep Aware’s Threat Research division identified a recent batch of fraudulent Microsoft support sites. While these scam campaigns are not novel, they

Enhancing your Cybersecurity Posture with the Power of Pause
Taking a moment or pausing before taking action is not a new concept; it is ingrained in all of our technology. It is an essential

Browser Notifications Hijacking via DDoS-Protection Mimicry
Key Findings: Overview Keep Aware’s Threat Research team has identified a browser notifications hijacking campaign that impersonates a Russian-based distributed denial of service (DDoS) protection

Browser Notifications Hijacking: A Trending Social Engineering Technique
Using Keep Aware Browser Security, our clients have detected an attack type that we have dubbed “Notification Hijacking.” These attacks involve malicious redirects that manipulate

Safeguards for Sensitive Data and Browser Security
Solution Spotlight Safeguarding sensitive information and ensuring secure application usage has always been a priority for cybersecurity teams. ChatGPT and other productivity tools have amplified

Addressing the Risks of Using Prompt-Based AI Tools: A Proactive Strategy
Key Takeaways: Employees are Capitalizing on Prompt-Based AI Tools There has been a trend across industries where businesses are flocking to integrate AI into their

Cybersecurity and Productivity: It’s Not a Balancing Act
The notion of prioritizing cybersecurity can be misconstrued as a hindrance to convenience and productivity – a ‘balancing act’. Security incidents over the past few

Spotting Gaps in MFA and SSO at the Browser Level
Solution Spotlight The latest release of the Keep Aware Browser Security platform highlights the active use of sign-in mechanisms and multi-factor authentication (MFA) usage across work accounts.

MFA and Blindspots: Solidifying Your Authentication Strategy with MFA and Visibility
Key Takeaways: Implementing MFA Is Important.. But It Has Its Blindspots Most IT and cybersecurity have heard of multi-factor authentication (also known as MFA, two-factor

Keep Aware achieves SOC 2 Type 2 Attestation
The Keep Aware team is excited to share that we have successfully completed the detailed audit established by the American Institute of Certified Public Accountants