Topics
Browser Notifications Hijacking via DDoS-Protection Mimicry
Key Findings: Overview Keep Aware’s Threat Research team has identified a browser notifications hijacking campaign that impersonates a Russian-based distributed denial of service (DDoS) protection
Browser Notifications Hijacking: A Trending Social Engineering Technique
Using Keep Aware Browser Security, our clients have detected an attack type that we have dubbed “Notification Hijacking.” These attacks involve malicious redirects that manipulate
Safeguards for Sensitive Data and Browser Security
Solution Spotlight Safeguarding sensitive information and ensuring secure application usage has always been a priority for cybersecurity teams. ChatGPT and other productivity tools have amplified
Addressing the Risks of Using Prompt-Based AI Tools: A Proactive Strategy
Key Takeaways: Employees are Capitalizing on Prompt-Based AI Tools There has been a trend across industries where businesses are flocking to integrate AI into their
Cybersecurity and Productivity: It’s Not a Balancing Act
The notion of prioritizing cybersecurity can be misconstrued as a hindrance to convenience and productivity – a ‘balancing act’. Security incidents over the past few
Spotting Gaps in MFA and SSO at the Browser Level
Solution Spotlight The latest release of the Keep Aware Browser Security platform highlights the active use of sign-in mechanisms and multi-factor authentication (MFA) usage across work accounts.
MFA and Blindspots: Solidifying Your Authentication Strategy with MFA and Visibility
Key Takeaways: Implementing MFA Is Important.. But It Has Its Blindspots Most IT and cybersecurity have heard of multi-factor authentication (also known as MFA, two-factor
Keep Aware achieves SOC 2 Type 2 Attestation
The Keep Aware team is excited to share that we have successfully completed the detailed audit established by the American Institute of Certified Public Accountants
Solving the Puzzle: Proactive Extension Management
Solution Spotlight Extensions have posed a significant challenge for organizations due to their complex management across different browsers. Each browser comes with distinct mechanisms for
Malicious Extensions: Uncovering Add-ons that Manipulate Search Behavior
An examination of how malicious extensions infiltrate organizations, bypassing network and endpoint security measures. The analysis reveals strategies used by attackers to capture and monitor
Keep Aware Raises $2.4 Million to Eliminate the Browser Blind Spot with Human-Centric Security
Cybersecurity platform provides continuous protection against people-targeted attacks such as phishing and social engineering by securing the application where work lives, the web browser. Austin,