[{"data":1,"prerenderedAt":124},["ShallowReactive",2],{"blog-1--All categories":3},{"data":4,"meta":118},[5,19,31,43,56,69,81,93,105],{"id":6,"attributes":7},785,{"title":8,"description":9,"articleId":10,"author":11,"metaDescription":12,"cloudflareImageURL":13,"imageAlt":14,"pageTitle":14,"createdAt":15,"updatedAt":16,"publishedAt":17,"badge":18,"canonicalUrl":11,"badgeList":11},"What Is DLL Hijacking? (DLL Search Order Hijacking Explained)","DLL hijacking happens when a Windows app loads the wrong DLL, often from a user-writable folder, letting attackers run code inside a trusted process. This guide explains the main variations (search order, sideloading, phantom DLL), plus detection and prevention checklists.","dll-hijacking",null,"DLL hijacking tricks Windows apps into loading a malicious DLL. Learn search order hijacking, sideloading, phantom DLLs, detection tips, and prevention.","https://imagedelivery.net/KxWh-mxPGDbsqJB3c5_fmA/2beb43b4-47bd-45bc-85ef-d9dd6b272800/public","DLL Hijacking: Definition, Variations & Prevention Guide","2026-02-06T14:58:22.618Z","2026-03-14T02:15:01.135Z","2026-02-06T15:16:21.954Z","Human Risk Management",{"id":20,"attributes":21},784,{"title":22,"description":23,"articleId":24,"author":11,"metaDescription":25,"cloudflareImageURL":26,"imageAlt":27,"pageTitle":27,"createdAt":28,"updatedAt":29,"publishedAt":30,"badge":11,"canonicalUrl":11,"badgeList":11},"Vulnerability Management: How to Find, Prioritize, and Fix Security Flaws (The Practical Guide)","Vulnerability management is a continuous loop: discover assets, scan for flaws, prioritize what’s exploitable and exposed, remediate fast, and verify. This guide shows a workflow using CISA KEV, CVSS, and EPSS, plus KPIs and checklists. Now.","vulnerability-management-guide","Vulnerability management finds, prioritizes, and fixes security flaws. Learn the lifecycle, KEV/CVSS/EPSS prioritization, KPIs, and best practices. ","https://imagedelivery.net/KxWh-mxPGDbsqJB3c5_fmA/d1cae17c-13d2-46d3-ba6d-e7ab2e1ae700/public","Vulnerability Management: Process, Prioritization & KPIs","2026-01-22T08:02:55.657Z","2026-03-14T02:15:00.033Z","2026-01-22T08:06:52.555Z",{"id":32,"attributes":33},783,{"title":34,"description":35,"articleId":36,"author":11,"metaDescription":37,"cloudflareImageURL":38,"imageAlt":39,"pageTitle":39,"createdAt":40,"updatedAt":41,"publishedAt":42,"badge":18,"canonicalUrl":11,"badgeList":11},"What Is a Firewall? How Does It Help Cybersecurity?","A firewall is a hardware/software security control that filters network traffic using rules. It improves cybersecurity by reducing attack surface, blocking unauthorized connections, enforcing segmentation, and providing visibility through logs. ","firewall-cybersecurity","A firewall filters network traffic using rules to block threats and reduce attack surface. Learn types (NGFW, WAF), how it works, best practices, and FAQs.","https://imagedelivery.net/KxWh-mxPGDbsqJB3c5_fmA/3bd73ce6-a9e0-4ee7-af5e-9e3d1a963c00/public","Firewall: What It Is and How It Protects Cybersecurity","2026-01-22T06:41:52.880Z","2026-03-14T02:14:58.816Z","2026-01-22T06:41:58.151Z",{"id":44,"attributes":45},782,{"title":46,"description":47,"articleId":48,"author":11,"metaDescription":49,"cloudflareImageURL":50,"imageAlt":51,"pageTitle":51,"createdAt":52,"updatedAt":53,"publishedAt":54,"badge":55,"canonicalUrl":11,"badgeList":11},"Agentic AI for Security Awareness Training: Achieving Measurable Behavior Change","Explore how Agentic AI revolutionizes security awareness training by autonomously creating personalized microlearning to reduce human-driven incidents. Learn the 5-step loop, benefits for CISOs, and a step-by-step guide using Keepnet's platform for measurable risk reduction.","agentic-ai-security-awareness-training","Discover how Agentic AI improves security awareness training with personalized microlearning. Learn the 5-step loop to reduce human-driven cyber incidents.","https://imagedelivery.net/KxWh-mxPGDbsqJB3c5_fmA/913110ff-2d49-4a46-1186-0713fa230300/public","Agentic AI for Security Awareness Training: Drive Behavior Change","2026-01-21T19:14:48.065Z","2026-03-14T02:14:57.689Z","2026-01-21T19:19:10.661Z","Security Awareness Training",{"id":57,"attributes":58},781,{"title":59,"description":60,"articleId":61,"author":11,"metaDescription":62,"cloudflareImageURL":63,"imageAlt":64,"pageTitle":64,"createdAt":65,"updatedAt":66,"publishedAt":67,"badge":11,"canonicalUrl":11,"badgeList":68},"AI Malware: What It Is, Real Examples, Detection Signals, and Prevention","AI malware is malware enhanced by AI, used to automate decisions, personalize attacks, and change behavior to evade defenses. This guide explains what qualifies as AI malware, real examples from research, detection signals, and prevention steps security teams can apply now.","ai-malware","AI malware uses AI/LLMs to automate or adapt attacks: recon, evasion, and payload behavior. Learn what’s real, examples, and how to prevent it.","https://imagedelivery.net/KxWh-mxPGDbsqJB3c5_fmA/80d4560a-1ceb-4b20-0f14-be3540118200/public","AI Malware: Definition, Examples, Detection & Prevention Guide","2026-01-16T14:29:39.269Z","2026-03-14T02:14:56.557Z","2026-01-16T14:49:23.899Z","Malware",{"id":70,"attributes":71},780,{"title":72,"description":73,"articleId":74,"author":11,"metaDescription":75,"cloudflareImageURL":76,"imageAlt":77,"pageTitle":77,"createdAt":78,"updatedAt":79,"publishedAt":80,"badge":11,"canonicalUrl":11,"badgeList":55},"Free Security Awareness Training (2026): Videos, Podcasts, PPT & SCORM Library","A free cyber security awareness training library for 2026 with short videos, podcasts, PPT decks, and SCORM packages. Use the pick-your-path guide, train by threat or role, and track outcomes like reporting rate and time-to-report.\n","free-security-awareness-training-library","Free security awareness training library for 2026: videos, podcasts, PPT decks, and SCORM packages. Includes a quick plan, role paths, and metrics to track.","https://imagedelivery.net/KxWh-mxPGDbsqJB3c5_fmA/8a7fceee-8178-4b8a-43ea-fb7dc16d7500/public","Free Security Awareness Training Library (2026) | PPT & SCORM","2026-01-09T16:09:36.401Z","2026-03-14T02:14:55.425Z","2026-01-09T16:09:38.354Z",{"id":82,"attributes":83},779,{"title":84,"description":85,"articleId":86,"author":11,"metaDescription":87,"cloudflareImageURL":88,"imageAlt":89,"pageTitle":89,"createdAt":90,"updatedAt":91,"publishedAt":92,"badge":11,"canonicalUrl":11,"badgeList":18},"What Is Identity-First Security? (Definition, Benefits, and Implementation)","Identity-first security puts identities, human and machine, at the center of protection. Instead of trusting the network perimeter, it verifies every login and session, limits privileges, and detects identity misuse fast (spraying, token theft, MFA fatigue) with strong controls and ITDR.","what-is-identity-first-security-definition-benefits-and-implementation","Identity-first security treats identity as the control plane, verify every access request, enforce least privilege, and detect identity threats fast with ITDR.","https://imagedelivery.net/KxWh-mxPGDbsqJB3c5_fmA/a0ed3d13-4e8a-4fdf-a9ed-1989e6286b00/public","Identity-First Security: What It Is & How to Implement It","2026-01-09T15:19:35.776Z","2026-03-14T02:14:53.747Z","2026-01-10T17:51:07.550Z",{"id":94,"attributes":95},778,{"title":96,"description":97,"articleId":98,"author":11,"metaDescription":99,"cloudflareImageURL":100,"imageAlt":101,"pageTitle":101,"createdAt":102,"updatedAt":103,"publishedAt":104,"badge":11,"canonicalUrl":11,"badgeList":11},"What is AI-Powered Ransomware? Definition, Examples, and Prevention","AI-powered ransomware is ransomware enhanced by AI, used to automate recon, craft convincing lures, adapt payload behavior, and scale extortion. This guide explains what it is, real-world research examples, and a prevention checklist CISOs can use today.","what-is-ai-powered-ransomware-definition-examples-and-prevention","AI-powered ransomware uses AI/LLMs to automate parts of the attack chain. Learn how it works, research-backed examples, red flags, and best defenses for teams.","https://imagedelivery.net/KxWh-mxPGDbsqJB3c5_fmA/0cd4d83d-b7ec-45fe-ff53-884c15009f00/public","AI-Powered Ransomware: Definition, Examples & Prevention","2026-01-08T15:07:01.991Z","2026-03-14T02:14:50.548Z","2026-01-08T15:08:41.663Z",{"id":106,"attributes":107},777,{"title":108,"description":109,"articleId":110,"author":11,"metaDescription":111,"cloudflareImageURL":112,"imageAlt":111,"pageTitle":113,"createdAt":114,"updatedAt":115,"publishedAt":116,"badge":11,"canonicalUrl":11,"badgeList":117},"Malvertising (Malicious Advertising): How It Works, Real Examples, and How to Stop It","Malvertising is malicious advertising: attackers buy or inject ads (including Sponsored search ads) that redirect users to malware, scams, or credential theft. Best defenses include cautious handling of Sponsored results, patching, blocking redirects/popups, and layered web + endpoint controls. ","malvertising","Malvertising uses online ads and sponsored results to spread malware or scams. Learn how it works, red flags, what to do if exposed, and prevention for teams.","https://imagedelivery.net/KxWh-mxPGDbsqJB3c5_fmA/c235134a-61ab-4a99-e897-380d5aa07d00/public","Malvertising: How Malicious Ads Infect Users (2026 Guide)","2025-12-31T12:38:35.611Z","2026-03-14T02:14:49.264Z","2026-01-02T07:05:00.007Z","Social Engineering",{"pagination":119},{"page":120,"pageSize":121,"pageCount":122,"total":123},1,9,69,615,1773944864610]