FEATURED BLOG

AI can crack your passwords. Here’s how Keeper can help.

As AI becomes more advanced, it’s important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. While AI password-cracking techniques...

Continue Reading

Search

Latest Keeper Blogs

The Keeper team had an amazing time at the 2023 Black Hat security conference in Las Vegas. We met with partners, prospects, friends, vendors, and of course, our incredible customers. Over the span of two days we talked to thousands of people and collected valuable data on a number of critical topics. In fact, we

Top Questions Keeper Received at BlackHat 2023

Keeping your social media accounts safe is crucial to keeping your sensitive data protected. In this blog, you’ll learn how to strengthen your accounts by using strong and unique passwords, setting up MFA, adjusting your privacy settings and keeping an eye on your account activity.  Continue reading to learn more ways you can secure your

How To Secure Your Social Media Accounts

Some signs that indicate your identity may have been stolen include seeing charges you didn’t make on your bank account statement, new inquiries on your credit report, an unusual drop in your credit score, credit checks you didn’t initiate, your credentials being posted on the dark web and more. Continue reading to learn more indications

How To Know if Your Identity Has Been Stolen

A password manager stores passwords securely, generates strong passwords, identifies weak and reused passwords, generates and stores 2FA codes, and stores other sensitive data like important files. Read on to learn more about what password managers do and why investing in a password manager is worth it.  What Is a Password Manager? A password manager

What Does a Password Manager Do?

Research finds 91% IT leaders are better protected with PAM, but seek affordable solutions. Keeper Security has released the second part of a series of Privileged Access Management (PAM) research, Privileged Access Management Survey: Deployment Amid Economic Uncertainty, to understand how IT leaders are approaching, deploying and streamlining their PAM solutions. Keeper surveyed over 400

KeeperPAM Report: Deployment During Economic Uncertainty

Malvertising–also called malicious advertising–is when cybercriminals use advertisements to infect devices with malware. Malvertising can appear on any advertisement you see online, you don’t necessarily have to be on a malicious website to be a victim of this cyber threat. When a victim is exposed to a malvertisement, their device and data are at risk

What Is Malvertising?

You can tell if someone has hacked your router if you notice that you can’t log into your router’s admin settings, your browser keeps redirecting you or you receive suspicious activity alerts from your internet service provider, among other signs. Continue reading to learn how someone can hack your router and how you can protect

How To Tell if Someone Hacked Your Router

Single Sign On (SSO) helps organizations improve their security posture while streamlining the employee login experience. Implementing an SSO platform across your organization is almost always a good idea. However, SSO leaves significant security and functionality gaps that organizations need to be aware of and address. SSO doesn’t cover everything. Many websites, applications, and systems

SAML vs OIDC for Password Manager SSO Integration

Caller ID spoofing, also known as phone spoofing, is when someone, usually a scammer or cybercriminal, disguises their caller ID information to hide who they really are. Caller ID spoofing can also spoof the cybercriminal’s location to make it appear as if the call is coming from a specific location. With caller ID spoofing, the

What Is Caller ID Spoofing?

Common indicators of a phishing attempt include warnings from your email service provider, urgent language, threat of dire consequences, too-good-to-be-true offers and more. Continue reading to learn what to look for to spot phishing attempts and how to keep yourself protected. What Is a Phishing Attempt? A phishing attempt is when a threat actor emails,

What Are Common Indicators of a Phishing Attempt?

A threat actor is an individual or group that purposefully exploits weaknesses in computer systems, networks, devices and individuals for their own benefit. There are many different types of threat actors, with each of them having their own motives and skill levels. Some types of threat actors include cybercriminals, insiders, hacktivists and nation-state threat actors.

What Is a Threat Actor?

Identity theft is a crime that is unfortunately common and is devastating for the victim. Serious cases can require enormous amounts of time and money to recover. The three primary categories of identity theft include online identity theft, financial identity theft and medical identity theft. Within these categories are dozens of ways criminals use the

Types of Identity Theft

In the realm of cybersecurity, the RockYou.txt wordlist has become a household name. It’s a tool used by security professionals to test the strength of network security. However, like many tools in the digital world, it can also be misused by malicious actors. In this blog post, we’ll delve into the history of RockYou.txt, its

Understanding RockYou.txt: A Tool for Security and a Weapon for Hackers

If you discover you are a victim of credit card fraud, start the recovery process by notifying your credit card issuer, placing a fraud alert on your credit report, freezing your credit and contacting the three major credit bureaus. However, before taking these steps, you should determine if you are in fact a victim of

What To Do if You Are a Victim of Credit Card Fraud

Banks, financial advisors and investment firms located in the Netherlands face a rapidly evolving threat landscape as cybercriminals from around the world increase attacks on the finance sector. Ransomware, account takeover and highly sophisticated supply chain attacks threaten sensitive information and can cause catastrophic monetary losses. The Financial Services Qualification System-Netherlands (FSQS-NL) is a highly

Keeper Security Is FSQS-NL Certified To Protect Dutch Banks

Unfortunately, Instagram is a common target for malicious hackers. Cybercriminals hack accounts in order to distribute spam, commit phishing attacks against your followers and steal your data. There were more than 1 million social media account takeovers in 2022, and most of the affected accounts were on Instagram. To prevent your Instagram from getting hacked,

How To Prevent Your Instagram from Getting Hacked

A good way to manage several passwords at once is by using a password manager. A password manager is a tool that aids users in creating, managing and securely storing all their passwords and sensitive data.  Continue reading to learn the importance of managing passwords and how you can manage several passwords at once with

What Is a Good Way To Manage Several Passwords at Once? 

This month’s newsletter is jam-packed with numerous features and product updates, including the FedRAMP Authorized Keeper Security Government Cloud (KSGC) offering for MSPs, support for passkeys and Keeper Secrets Manager (KSM) CLI support for AWS Secrets Manager. If you haven’t already, join Keeper on subreddit at r/Keepersecurity, to receive real-time news, ask questions and chat

What’s New with Keeper | July 2023

A 2FA code, which stands for two-factor authentication code, is a form of Multi-Factor Authentication (MFA) that requires a generated code as an additional verification factor to a username and password. For example, when logging in to an account, instead of solely entering your credentials, you would also have to provide a second method of

What Is a 2FA Code?

What’s Trending