Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeper

What Are Deepfakes?

A deepfake is a form of media, such as a photo or video, generated by Artificial Intelligence (AI) to depict real or non-existent people performing actions they never did. AI manipulates a picture, video or voice recording to analyze a person’s characteristics and then blends those characteristics with existing footage using unique algorithms.

Keeper Announces New Updates Including Passphrase Generator for iOS and Android

Keeper Security is excited to announce that passphrases are now supported for mobile platforms on Android and coming soon for iOS, extending the same passphrase experience users have enjoyed in the Keeper Web Vault. In addition, Keeper’s latest update provides enhanced autofill capabilities for long-tap autofilling and Time-based One-Time Passwords (TOTP) on iOS.

Keeper 101 | Enterprise: Risk Management Dashboard

The Keeper Risk Management Dashboard is a powerful feature of the Keeper Admin Console that provides comprehensive security posture information covering end-user deployment, utilization, cloud configuration, and event monitoring. This critical data helps administrators ensure that risks are remediated and compliance is enforced effectively. The Risk Management Dashboard monitors key metrics and leverages Keeper Security's Benchmarks to enforce the highest level of security in your environment across all users and devices.

How To Detect and Remove a Keylogger

You can detect a keylogger if you notice unfamiliar apps on your device, slower performance speeds, a lag in mouse movements or strange background noises on phone calls. A keylogger is a type of malware that requires an entry point, such as an email or cloud program, to be installed on your device. Once it is on your device, a cybercriminal can monitor every keystroke you make to learn your login credentials and private information.

How Did My Personal Information Get on the Dark Web?

If you realize that your personal information has been found on the dark web, you may be wondering how this could have happened. Your personal information could have ended up on the dark web through a data breach, a compromised account, a phishing scam or a malware infection. The dark web is part of the internet used by cybercriminals to buy and sell stolen information. Continue reading to learn how to tell if your personal information is on the dark web, how it got there and how to protect your identity.

Five Reasons Small Businesses Need a Password Manager

Your small business should rely on a password manager to ensure your employees use strong passwords, to simplify onboarding and offboarding processes, securely share files, avoid potentially losing money from a cyber attack and improve employee productivity. A business password manager allows you and your employees to store and protect all passwords, with each employee having their own digital vault.

Password Length vs Complexity: Which Is More Important?

According to the National Institute of Standards and Technology (NIST), complex passwords that contain a variety of characters are strong, but the longer a password is, regardless of the types of characters, the more secure it is. Password length is generally more important than complexity because longer passwords are typically harder for cybercriminals to crack. That being said, you should also prioritize making your passwords complex for added security.

The Most Recent Credential Stuffing Attacks on Companies in 2024

So far in 2024, many major companies have fallen victim to credential stuffing attacks. Some of these notable credential stuffing victims include Roku, Okta, General Motors and Levi’s. Credential stuffing attacks occur when a cybercriminal uses stolen login credentials to attempt to log in to multiple accounts simultaneously. Since many people reuse their passwords, cybercriminals can use stolen credentials to sign in to many accounts, compromising employee, customer and organizational data.

How AI Is Making Phishing Attacks More Dangerous

Phishing attacks occur when cybercriminals trick their victims into sharing personal information, such as passwords or credit card numbers, by pretending to be someone they’re not. Artificial Intelligence (AI) has made it easier for cybercriminals to carry out phishing attacks by writing believable phishing messages, mimicking people’s voices, researching targets and creating deepfakes.

Securing the Cyber Kill Chain

We recognize that federal agencies face a wide range of cyber threats in today’s hybrid and cloud work environment, which requires securing multiple endpoints. From nation-states to organized crime groups, adversaries are looking to steal data at the highest levels of government, and the stakes have never been higher. Protecting sensitive information, ensuring national security and safeguarding public trust all hinge on effective cybersecurity strategies.