Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeper

What's New With Keeper | December 2023

This month we have a number of new feature enhancements and product updates to share with you, including Dark Mode for Android, thoughtful setting enhancements across the Keeper vault and browser extension, as well as improvements to our AWS CLI credential process with Keeper’s Secrets Manager (KSM). Continue reading to learn more.

How To Run a Penetration Test

You can run a penetration test by following the five stages: preparation, reconnaissance, penetration, reporting and remediation. Penetration tests are important to help protect an organization from security breaches and data leaks. Cybercriminals are always looking for vulnerabilities within an organization’s system to steal their sensitive data. Penetration testing helps organizations identify security vulnerabilities to help prevent security breaches.

How To Protect an Enterprise Database From Privilege Abuse

Organizations can protect their enterprise database from privilege abuse by implementing the Principle of Least Privilege (PoLP), following a zero-trust security approach and investing in a Privileged Access Management (PAM) solution. Continue reading to learn what privilege abuse is, the risks of privilege abuse in an organization and how to prevent it.

How Does a PAM Solution Help Organizations Meet CIP Cyber Security Standards?

The North American Electric Reliability Corporation’s Critical Infrastructure Protection (NERC CIP) standards are a comprehensive set of requirements that ensure the security and reliability of the North American power grid. These standards address both the physical security and cybersecurity of the bulk electric system, mandating measures to protect critical assets from potential threats.

What Is Ransomware as a Service?

Ransomware as a Service (RaaS) is a business model in which cybercriminals develop and sell ransomware to buyers known as affiliates who use it to execute ransomware attacks. Ransomware is a type of malware that prevents users from accessing their data or devices by encrypting them and locking users out until a ransom is paid. Typically, cybercriminals need to know some coding to develop and execute ransomware attacks.

What Are Dark Web Scans?

Dark web scans, also known as data breach scans, are scans that let you know if your personal information, such as your email and login credentials, is on the dark web. There are several free and paid dark web scans available online to use and each of them works differently. Continue reading to learn what the dark web is, how dark web scans work and how to initiate a dark web scan.

How To Know if Your Smart TV Was Hacked and What To Do

You can tell your smart TV has been hacked if you notice unusual activity on your smart TV, strange popup windows, changed privacy and security settings, slow performance and unauthorized access to your accounts. Surprisingly, smart TVs can get hacked just like any other Internet of Things (IoT) device that connects to the internet. Cybercriminals can hack your smart TV to spy on you or infect other devices on the same network. You need to secure your smart TV to protect it from hackers.

What Is Quishing?

QR code phishing, most commonly referred to as “quishing,” is a type of phishing attack that tricks users into scanning QR codes to steal personal information such as login credentials or credit card numbers. When a user scans a QR code created for a quishing attack, they are taken to a malicious website that either downloads malware on their phone or asks for their personal information.