Authentication Breach Alert: OAuth Flaw Enables “Perfect Phishing” Campaign

A sophisticated phishing campaign exploiting authentication vulnerabilities in a major email service provider has security leaders on alert, as threat actors demonst...

Read more

Man reviewing email security programs at desk in office

How Check Point’s AI-Powered Phishing SIM is Reshaping Security Awareness

More than 90% of cyber attacks start with a malicious email. Although security leaders need to invest heavily in technical controls, they also need to attend to the ...

Read more

Competition

When Competitors are Good

I bet you would never have guessed you’d hear those words out of my mouth. But the truth really is competition makes us all better. With competition we are incented ...

Read more

Authentication Breach Alert: OAuth Flaw Enables “Perfect Phishing” Campaign

A sophisticated phishing campaign exploiting authentication vulnerabilities in a major email service provider has security leaders on alert, as threat actors demonst...

Read more

Invoice Fraud: A Growing Threat to SMBs in 2025

In a troubling trend sweeping across the business landscape, cyber criminals are turning to invoice fraud in order to target small and medium-sized businesses. These...

Read more

PoisonSeed Campaign: New Supply Chain Phishing Attack Targets CRM and Email Providers

Overview: A sophisticated new supply chain attack, dubbed PoisonSeed, is systematically compromising customer relationship management (CRM) and bulk email providers ...

Read more

Morphing Meerkat: An Advanced Phishing Platform

Since the initial discovery of Morphing Meerkat, a Phishing-as-a-Service (PhaaS) platform first identified in 2020, the platform has evolved significantly.

Read more

Healthcare Data Breaches Reflect Need for Cyber Security Refresh

In 2024, 259 million Americans, or 76% of the population, experienced the effects of health-related data breaches. Nearly 50% of cyber security professionals in the ...

Read more

Threat Analysis: Phishing Campaign Targets Google Account Credentials

Cyber criminals have launched a sophisticated phishing campaign that exploits the trusted reputation of Semrush — an SEO firm that's captured 40% of Fortune 500 bran...

Read more

The Dark Side of QR Codes: Business Impact of Quishing

Around the world, organizations are leveraging QR codes to simplify the way in which they conduct business. Whether that means offering QR code-based rebates, coupon...

Read more

The PCI DSS 4.0 Deadline: Are You Prepared to Protect Payment Data?

The March 31st deadline for PCI DSS 4.0 compliance is rapidly approaching. Across the globe, organizations are racing to ensure that their systems meet the new manda...

Read more

Medusa Ransomware: Multi-Industry Threat on the Rise

Overview: Federal cybersecurity agencies have issued an urgent warning about the growing threat of Medusa ransomware, which has significantly expanded its operations...

Read more

Abstract technology concept art

“ClickFix” Phishing Impersonation Campaign Targets Hospitality Sector

Overview: A sophisticated phishing operation has emerged as a significant concern for the hospitality sector. The campaign leverages innovative social engineering te...

Read more

Email Security Strategies for CISOs and Cybersecurity Leaders (2025)

Email security isn’t just another box to check – it’s the digital front door to your organization, where more than 90% of cyber attacks begin. As cyber threats conti...

Read more

FBI Alert: Email Extortion Campaign Falsely Claims BianLian Ransomware Affiliation

Overview: The U.S. Federal Bureau of Investigation (FBI) has recently released an urgent advisory pertaining to a sophisticated email-based extortion campaign. The c...

Read more

Advanced Social Engineering Campaign Exploiting Enterprise Communications Platforms

Overview: Cyber security researchers have discovered a new and sophisticated cyber attack campaign that’s predicated on social engineering and remote access tool use...

Read more

Threat Alert: Sophisticated Botnet Targeting Microsoft 365 with Advanced Authentication Bypass Techniques

Overview: A sophisticated botnet comprised of over 130,000 compromised devices is orchestrating large-scale password spraying attacks against Microsoft 365 accounts ...

Read more

Abstract tech concept art

Cyber Criminals Using URL Tricks to Deceive Users

Overview: In a newly observed scam, Check Point researchers found 200,000 phishing emails that abused URL information to obfuscate phishing links. The scam was first...

Read more

Security Alert: Device Code Authentication Phishing Attack

Check Point researchers have discovered an extremely sophisticated attack, perpetrated by nation state threat actors, that targeted the CEO and a high-ranking employ...

Read more

New Facebook Copyright Infringement Phishing Campaign

Facebook is the most popular social network worldwide, outperforming every other competitor for reach and active users, according to Statista. Further, according to ...

Read more

Brand Impersonation Scam Hijacks Travel Agency Accounts

Recently, within the span of a week, a new and extensive phishing campaign compromised more than 7,300 businesses and 40,000 individuals around the world. The most h...

Read more

These Multi-Layered Social Engineering Attacks are Reaching End-Users (and Harming Companies)

Starting in October of 2024, cyber security researchers have observed the Black Basta ransomware group’s deployment of new payloads – Zbot and DarkGate malware – via...

Read more

FBI Warns of Holiday Shopping Scams: What Your Business Should Know

Overview: As the holiday shopping season reaches its peak with Cyber Monday, organizations are contending with high levels of cyber risk.

Read more

The Evasive Nature of an Emerging Two-step Phishing Threat

Overview: In a campaign targeting hundreds of organizations worldwide, cyber criminals are exploiting Microsoft Visio files (.vsdx) and SharePoint to execute two-ste...

Read more

Email Bomb Attacks: A Threat to Enterprise Security

Attack overview: A novel cyber threat, known as an “email bomb” attack, is affecting organizations and individuals around the globe. The threat involves flooding use...

Read more

“Remember Me” Cookies Under Exploit in Account Takeover Attempts

The U.S. Federal Bureau of Investigation has issued a new warning around the cyber criminal theft of “remember me” cookies. What’s Happening Cyber criminals are dire...

Read more

New Phishing Campaign Exploiting Google App Scripts: What Organizations Need to Know

Cyber security researchers from Avanan have recently identified a concerning phishing campaign that leverages Google Apps Script macros – a tool used to automate tas...

Read more

AI-powered BEC Attacks Overruning Organizations Without AI Solutions

What is a BEC Threat? Business Email Compromise (BEC) is a type of cyber threat that aims to manipulate people into acting in the interests of a cyber criminal. Thes...

Read more

SaaS companies spoofed in nearly undetectable new phishing campaigns

EXECUTIVE SUMMARY: Software-as-a-Service platforms and their clients face an insidious type of phishing-based threat. Organizations that fail to get ahead of it can ...

Read more

Relentless Cyber Security: Making Sense of the CrowdStrike Disruption

The recent global computer outage caused by a CrowdStrike update stands as a poignant reminder of the profound pressures faced by professionals in this field. While ...

Read more

Zero-Click Attacks

Latest Zero-Click Attack in Outlook Delivers Instant Malware

Earlier this year, we reported on Zero-Click Attacks in Microsoft Outlook that could compromise a user without them taking any action. Cyber Security News recently r...

Read more

BEC 4.0: Business Communication Compromise 

Microsoft Teams is a popular communication channel for many organizations.

Read more

The Evolution of QR Code Phishing: ASCII-Based QR Codes 

Quishing—QR code phishing—is a rapidly evolving threat. Starting around August, when we saw the first rapid increase, we’ve also seen a change in the type of QR code...

Read more

What You Need to Know from the 2024 Verizon Data Breach Investigations Report

The 2024 Verizon Data Breach Investigations Report (DBIR) is always one of the most hotly anticipated cyber security reports and this year it has been released chock...

Read more

Innovation Continues with the Unified Quarantine

When it comes to innovation in email security, no one can come close to our track record.

Read more

Spoofing Shein for Credential Harvesting 

Shein is one of the most popular shopping apps in the world. In fact, it’s the second most downloaded shopping app globally, with over 251 million downloads.

Read more

Attack Report: Custom QR Code Phishing Templates 

QR Code phishing—or Quishing—has continued to be a hot topic in email security.

Read more

Override Microsoft's High Confidence False Positive Phishing

Since our inception, we've prided ourselves on "catching what Microsoft misses." We scan every email that Microsoft lets through and give it a thumbs up or down, pro...

Read more

The Importance of Flexible Deployments

In today's rapidly evolving digital landscape, email remains a critical artery of communication for organizations worldwide. However, this indispensable tool is also...

Read more

Understanding AI in Email Security: Beyond the Hype

As we navigate deeper into the digital age, the omnipresence of AI (Artificial Intelligence) in cybersecurity narratives has become undeniable. With every vendor cla...

Read more

Navigating the Evolution of Email Security: From Gateways to AI-Driven Cloud Solutions

The digital transformation journey has led many organizations toward cloud-based email systems, a move that has significantly altered the cybersecurity landscape. Th...

Read more

New Third-Party Evaluation Showcases HEC's Effectiveness

Miercom assessed the five top security vendors' Zero Trust Platforms, comparing their security efficacy, ease of use, breadth and comprehensiveness.

Read more

HEC Combines Best-in-Class Phishing with Best-in-Class Malware Protection 

Ransomware and malware remain a primary concern for organizations. In 2023, 1 in every 10 organizations worldwide was hit with an attempted ransomware attack, a 33% ...

Read more

Microsoft's Clever Trick Beats Google's Guard: A Simple Guide to Cybersecurity's Latest Discovery

Mail Exchange records—or MX Records—is a public way of notating the mail server responsible for receiving and sending messages. Think of it like a public address, si...

Read more

Check Point Customers Protected from CVSS 9.8 Moniker Link Bug

New research by Check Point has found a significant security vulnerability in Microsoft Outlook, known as the #MonikerLink bug. The bug exploits the way Outlook proc...

Read more

5 Quick Tweaks to Improve Email Security

Are you frustrated with the lack of effectiveness in your email security measures? Despite investing in various solutions, you may still be vulnerable to cyber threa...

Read more

Spoofing Temu for Credential Harvesting

Temu, an international online e-commerce store that has quickly gained prominence, offers discounted goods directly shipped to consumers without intermediate distrib...

Read more

Beware of Invoice Phishing: 5 Tips to Stay Safe

Phishing attacks have become increasingly sophisticated, and one of the latest threats targeting Microsoft 365 users is the fake invoice phishing scam. This scam aim...

Read more

3 Reasons Why Account Takeover Protection is an Important Part of Email Security

Account takeover is a growing concern in the world of email security. Cybercriminals are constantly finding new ways to gain unauthorized access to email accounts, a...

Read more

Fake Voicemail as Credential Harvesting Lure

Hackers will try just about anything to get you to click on a malicious link.

Read more

Conditional QR Code Routing Attacks

Over the summer, we saw a somewhat unexpected rise in QR-code-based phishing attacks.

Read more

Top Impersonated Brands in Phishing

Q4 2023 has come and gone, but the threat of phishing attacks remains on the rise, with "brand phishing" taking the lead. According to Check Point's 2024 Brand Phish...

Read more

Understanding the Risks: How Your Outlook Inbox Can Be a Gateway for Cyber Attacks

In the digital age, email has become an indispensable tool for communication, especially within organizations. Services like Outlook are integral for scheduling meet...

Read more

Ransomware Continues Meteoric Rise

It is officially 2024, and hearing the phrase, "new year, new you," is expected and typically indicates change (e.g., bad habits, personal development, exercise, etc...

Read more

The Rise of Phishing Attacks with Crypto Drainers

A new report by Check Point Research illustrates a concerning rise in advanced phishing attacks that target blockchain networks by using wallet-draining techniques.

Read more

Zero-Click Attacks Continue to Proliferate

In March of 2023, Microsoft confirmed a zero-click attack in Outlook that would compromise the end-user without them doing anything. They don’t need to click a link ...

Read more

Stop Zero-Day Malware in its Tracks

Would you believe that many API-based email security solutions don't look at malware?

Read more

How to Inspect Encrypted Attachments

Many Phishing attacks include password-protected attachments as a means to avoid inspection. These attacks often employ very simple techniques to prevent security so...

Read more

How to Keep Spam and Phishing Out of the Inbox

You have a spam and phishing problem.

Read more

Secure Your Email in a Few Clicks

Need to improve your email security? It doesn't take long. In just a few clicks, you can set up Avanan and immediately see the results. Don't believe us? See it for ...

Read more

Phishing via Google Forms

We’ve been writing extensively about BEC 3.0 attacks.

Read more

The Rise in Email Phishing Attacks Amidst the Israel-Hamas Conflict  

Threat actors have long taken advantage of current events -- from natural disasters to regional holidays and cultural moments -- to deceive people.

Read more

Extending QR Code Phishing Capabilities with Link Rewriting

Recently, we've seen a large rise in QR-code, or Quishing, attacks. These QR codes are delivered via email and contain a link to a malicious credential harvesting pa...

Read more

Manage Spam With Intelligent AI

One person's spam is another person's newsletter. These differing opinions in how end-users view emails fall into a larger category called graymail. It could be a sp...

Read more

QR Code Attacks Have Global Reach 

Cybercriminals are launching incredibly sophisticated "quishing” campaigns armed with malicious QR codes. Attack volumes have grown 2,400% since May, including an at...

Read more

The Rise in QR Code Attacks

Recently, we've seen a lot of news about Quishing--or QR Code phishing. This is when the link behind a QR code is malicious, but the QR code itself is not. There was...

Read more

Preventing QR Code Phishing: Increased Visibility for Admins

The hottest trend in the world of email security is quishing or QR Code phishing.

Read more

Account Takeover: The Bank Signature Change

When someone takes over an account via email, they usually do one of the following actions:

Read more

Introducing SmartVault: Secure Messaging for Microsoft 365

DLP serves as a crucial tool for preventing and controlling the sharing of sensitive information with external parties.

Read more

Account Takeover from Student Emails

Account takeovers happen when an outside actor gains access to an email account. This can happen through a number of ways, from standard brute force to more complex ...

Read more

Phishing via Google Collection

We've been continually writing about how hackers are utilizing Google as a springboard to launch phishing attacks. The latest version of this is through Google Colle...

Read more

BBTok: Analyzing Banking Malware

Recently, Check Point Research (CPR) made an alarming discovery in Latin America - an ongoing campaign deploying a fresh variant of the BBTok banking malware. This n...

Read more

Preventing QR Code Phishing From Reaching the Inbox

Recently, we've seen a lot of news about Quishing--or QR Code phishing. This is when the link behind a QR code is malicious, but the QR code itself is not. There was...

Read more

VIDEO: Phishing via Google Ads

We've been writing more and more about the ways in which hackers are utilizing Google services to launch phishing attacks. One of the ways they are doing this is by ...

Read more

Attack Breakdown: BEC in Action

BEC attacks are financially damaging and difficult to stop. It's why hackers continually launch these attacks. In this video, we break down one example of a BEC atta...

Read more

Account Takeover Attack: How This Hotel Almost Lost $50,000

In an account takeover (ATO) attack, an attacker gains unauthorized access to the credentials for a user’s online account. This access can then be used for identity ...

Read more

Breaking Down the Remcos Malware Attempts on Colombian Banks

Check Point researchers recently discovered a large-scale phishing campaign in Colombia targeting over 40 prominent companies. The attackers aimed to discreetly inst...

Read more

VIDEO: Phishing via Google Docs

We've written a lot recently about how Google services are being utilized by hackers as a springboard for carrying out phishing attacks. One of those services is Goo...

Read more

Breaking Down PayPal BEC 3.0 Scams

We've written a lot about how scammers are using PayPal for BEC 3.0 scams. This means tat hackers are sending invoices directly from PayPal, not a spoofed site. That...

Read more

Phishing via Adobe

We’ve been talking about it week after week—hackers are using legitimate services for illegitimate means.

Read more

Breaking Down ZeroFont Phishing Attacks

We first wrote about ZeroFont phishing a few years ago, and it remains one of our most viewed stories here. Why? Because it's an innovative technique that hackers ha...

Read more

Storm-0324 Threat Group Switches Phishing Tactics to Teams

A stunning new development in the world of Teams phishing was announced by Microsoft.

Read more

Another Teams Attack Highlights Importance of Full-Suite Security

A new phishing campaign is taking off in MIcrosoft Teams.

Read more

VIDEO: Phishing via Google Looker Studio

Last week, we wrote about how hackers are utilizing Google Looker Studio to carry out phishing campaigns.

Read more

A Deep Dive into HTML and HTM Attachment Phishing

HTML and HTM attachments make up 50% of malicious attachments. Why are hackers resorting to this attachment form? In this video, we break it down:

Read more

New Teams Attacks: A Harbinger of Potential Issues to Come

Microsoft Teams is quickly becoming a burgeoning attack vector. We've written about a few new attacks recently. In this video, we break down one of them:

Read more

Cyber Criminals Phishing via Google Looker Studio

Today, we’re writing about cyberattacks we’re seeing via Google Looker Studio and other Google applications. Google Looker Studio is a powerful data visualization so...

Read more

BEC in Personal Email

By now, you know full well what BEC is. It's receiving a message, usually from someone pretending to be a higher-up, and asking for information. These are incredibly...

Read more

Video: Spoofing Zelle to Steal Credentials

Zelle, the money-transfer service, is a favorite of hackers to spoof. We've written about it in detail. In this video, we walk you through what a typical Zelle scam ...

Read more

Switching from a SEG is Easier Than Ever

Interested in switching from your SEG and moving on to Avanan? The transition in super easy. Here's how you do it:

Read more

Don't Play SOC Whack-a-Mole with Phishing

Whack-a-Mole is fun at the arcade--less fun if it's a staple of your email security program. But with many API solutions, playing whack-a-mole is the only option. An...

Read more

5 Key Measures to Guard Against Ransomware

The word ransomware is enough to cause fear in any organization. But it doesn't have to be fear-inducing. Our guide provides five security measures that you can impl...

Read more

Getting a Grip on BEC

Business Email Compromise is the most financially damaging phishing attack in cybersecurity. How can your organization ensure it doesn't cause damage? This is a guid...

Read more

Solving 5 Key Security Issues

Our product is comprehensive, but our customers continually come to us for the following five key security issues.

Read more

Go Phish: The Email Security Video Game!

We're lucky to have a ton of talented employees here at Avanan. One of them, Sr. Solutions Engineer Michael Hansen, has a wide variety of skills, including coding. A...

Read more

How We Align with NIST

The NIST (National Institute of Standards and Technology) Cybersecurity Framework is a widely recognized framework that provides guidelines for improving the cyberse...

Read more

The SolarWinds Group is Moving Focus to Microsoft Teams

NOBELIUM--aka Midnight Blizzard, APT29, Cozy Bear--the group behind the sprawling SolarWinds attack, is at it again, with a new attack utilizing Teams.

Read more

Phishing via AWS

The hottest trend in the phishing world is leveraging legitimate services to send illegitimate messages.

Read more

Phishing via SharePoint

We’ve been writing recently about how hackers are utilizing legitimate services to send out phishing campaigns.

Read more

Slack is a DLP Nightmare. Here's How We Handle It

One of our customers uses Slack for a lot of their daily communication. The company holds a lot of data about customers, and often this is shared internally to facil...

Read more

Phishing via Google Ads

Ads make the internet go round. And nobody does more with online ads than Google.

Read more

Phishing via Google Collections

Google Collection is a cool tool that allows you to save links, images and videos and share them with others.

Read more

The Automatic Forwarding Problem in Action

Last year, we wrote about a story we heard. Someone who was using an API-based competitor for email security told us about a mail rule they have: every email that go...

Read more

To Be Granular or Not: With Avanan, That Isn't a Question

According to our own Michael Hansen, one of our Security Engineers, "One user's newsletter is another user's spam."

Read more

The NATO Summit Email Attack: What You Need to Know

Executive Summary A new cyber attack targeting NATO countries supporting Ukraine during the NATO Summit shows why only a comprehensive email security solution can st...

Read more

Google Docs Phishing

Using the comment feature in Google Docs represents another instance in the evolution of BEC 3.0. Utilizing legitimate sites makes it easy for hackers to end up in t...

Read more

URL-Based Phishing: Fake Louis Vuitton

Phishing through URL-based scams is a deceitful tactic used by hackers to obtain confidential information from users by creating fake links that mimic legitimate one...

Read more

30 Years of Cyber Leadership

This month, Check Point celebrated 30 years as a company. This is an incredible achievement for any company.

Read more

Teams Attacks Continue to Spread

Last week, we wrote about a new Teams malware variant making the rounds. As we wrote, the vulnerability essentially allows hackers to bypass all security measures an...

Read more

Finding Phishing Help via Facebook

Cybercriminals have a sneaky technique up their sleeves - brand phishing, also known as brand impersonation or brand spoofing. This tactic involves assuming the iden...

Read more

New Teams Attack Delivers Instant Malware

A recently discovered vulnerability in Microsoft Teams has opened the door for non-employees to effortlessly send harmful files to employees without undergoing any s...

Read more

Phorm Phishing: Using Form Service APIs to Steal Credentials

In recent months, Check Point Research has observed a surge in phishing attacks that exploit reputable online form builder services like Formspark, Formspree, EmailJ...

Read more

The Unified Quarantine: Saving the SOC Team Time and Frustration

It is widely acknowledged in the market that organizations require an extra layer of email security to complement Microsoft's existing protection.

Read more

PDF-Based Attacks on the Rise: Here's How Deep Learning Can Prevent Them

In June, 43% of all malicious files were PDFs, indicating a significant rise in their use for malicious purposes.

Read more

Artificial Intelligence in Cybersecurity: How Check Point's ThreatCloud AI Works

Mark Ostrowski is Head of Engineering, US East, Check Point. He has 20 years’ experience in IT security and has helped design and support some of the largest securit...

Read more

URL-Based Phishing: The Fake Meta Mask Page

URL-based phishing tricks users into providing sensitive information to hackers through fake links that imitate legitimate ones. We've been looking at some examples ...

Read more

Simplicity, Reliability and Flexibility with Deployments

A majority of our customers--90%--use our patented inline mode for email security.

Read more

Classic Account Takeover via the Direct Deposit Change

One of the key capabilities of an email security solution is the ability to detect anomalies. When something happens that's out of the ordinary, it can be a sign tha...

Read more

URL-Based Phishing: The Fake Instagram

One of the biggest problems with online security is URL-based phishing. These attacks involve fake links that mimic legitimate ones, tricking users into entering sen...

Read more

Over Half of Malicious Files are HTML Attachments

Our research has revealed that credential harvesting remains the top attack vector, responsible for 59% of attacks. This malicious tactic also plays a significant ro...

Read more

Using Legitimate PDFs for BEC 3.0 Attacks

Soda PDF is a popular PDF editing tool. It allows for the easy editing of PDFs–which is not always an easy thing to do–as well as various features like conversion to...

Read more

Forrester Names Check Point a Leader in Enterprise Email Security Wave

We're proud to be named a Leader in The Forrester Wave™: Enterprise Email Security, Q2 2023 report. Harmony Email & Collaboration (HEC) received the highest scor...

Read more

Botswana Power Corporation Secured Users and Devices with HEC

Botswana Power Corporation (BPC) struggled with protecting its operation and strategic infrastructure as email became the prevalent attack vector. Their needs requir...

Read more

Introduction to AI/ML in Everyday Life: How it Works and What's Needed

Mark Ostrowski is Head of Engineering, US East, Check Point. He has 20 years’ experience in IT security and has helped design and support some of the largest securit...

Read more

AESI Found Peace of Mind with HEC

AESI is a consulting service to electric utility generation, transmission, distribution, and independent system operators. After testing their email security effecti...

Read more

How Lightbeam Health Improved Email Security Health

Lightbeam Health solutions help unify claims and clinical data to healthcare solutions.

Read more

Here's How GIMV was Able to Set and Forget Its Email Security

GIMV secures critical investment data for many financial services. However, their challenge to protect their cloud IT strategies and manage an ever-changing landscap...

Read more

Solving the BEC Problem with HEC

Ayesa is a technology solution to assist engineering, technology, and consulting agencies. After facing multiple sophisticated threats to their cloud-based platforms...

Read more

Aalborg Kommune Turned to HEC for Easy to Use Security

Aalborg Kommune wanted a solution providing consistent email security covering Microsoft 365 and cloud-based platforms. However, to relieve the burden from their sup...

Read more

How Midwest Rubber Reduced Their IT Team's Alert Fatigue

A large manufacturing company, Midwest Rubber, needed to protect their company from malware, phishing, and malicious attacks while simplifying management complexity....

Read more

The Picture in Picture Attack

Successful hacks rarely spell out what’s about to happen.

Read more

Post-Delivery Email Threats Create Havoc for the SOC

When it comes to spear-phishing, the force a threat actor takes to impact its victim can produce equal (if not greater) damage, and one way of doing so is using the ...

Read more

Zero-Click Attacks: Why Prevention, Not Remediation is Essential for Full Security

We've talked a lot about the Zero-Click attack that was recently propagated on Outlook. It allows for a damaging attack that steals NTLM hashes (the form in which Wi...

Read more

What Makes Good AI? We Asked ChatGPT

ChatGPT doesn't actually "know" anything (it's a statistical program), but if it's going to have a sentient sense of anything, it's probably going to be about AI its...

Read more

Canal Bank Solved Their Phishing Problem With an Easy To Implement System

Canal Bank helps protect Panama's commercial clients. With sensitive data to protect, Canal Bank needed a solution to defend its Office 365 users from malware, phish...

Read more

Leveraging Dropbox to Soar Into Inbox

Email threats continue to increase. In the first half of 2022, according to Check Point Research, email-delivered attacks reached 89% of all in-the-wild attacks.

Read more

How HEC Drastically Improved Regina Miracle's Ability to Block Attacks

Regina Miracle is a leading intimate wear, sportswear, and personal protective equipment manufacturer. After failed attempts from Microsoft to protect their Office 3...

Read more

Delivering Outstanding Protection and Performance for Quectel

Quectel is a global IoT solution based in Shanghai and has faced increasing risks for cyber-attacks, with ransomware being the primary weapon. Needing a comprehensiv...

Read more

How We Use AI to Find Anomalous Logins by Compromised Accounts

One of our key features for blocking compromised accounts is our auto-blocking feature.

Read more

Is Your Artificial Intelligence Actually Human?

There is an AI arms race in all industries, and nowhere is that more apparent than in email security.

Read more

Gaining Visibility to Microsoft Detections

Organizations know that today’s email threats mandate layered security and require the deployment of another email security solution on top of Microsoft’s, whether i...

Read more

Creating Malicious Content Hosted on Squarespace

We have been tracking the next wave of Business Email Compromise attacks. It relies on the use of legitimate services to unleash attacks. There’s nothing fake or spo...

Read more

Creating DLP Policies That Fit Your Organization

Data loss prevention is a key part of any email security solution. Preventing sensitive data from getting into the wrong hands is an essential part of what we do.

Read more

The Fake Firefighter PayPal Scam

We've written extensively about the tremendous wave of attacks that are being originated from PayPal.

Read more

Phishing Links via Linktree

UPDATE, 5/2/23: On Tuesday, 5/2/23, Avanan researchers and members of Linktree’s security and trust team spoke via video conference. The two companies spoke in more ...

Read more

Zelle Phishing

Zelle, the widely used and highly acclaimed money-transfer service, is now a prime target for cybercriminals. The simplicity of sending funds to friends or businesse...

Read more

Phishing From QuickBooks

The new wave of phishing that we’ve talked a lot about is BEC 3.0. Essentially, it’s the ability for hackers to sign up for a free account somewhere, send out an inv...

Read more

Taking Action on Anomalous Behavior

One of the key tenants of email security is detecting anomalies. When something happens that's out of the ordinary, it can be a sign that malicious behavior is afoot...

Read more

The Importance of Integrated Email Security

We’ve redefined email security a number of times.

Read more

The Problem with Blinding Default Security

Customers that use gateways like Mimecast, Proofpoint, Barracuda and IronPort might be susceptible to email attacks that other Office 365 and Gmail customers are not...

Read more

The Replier Attack

Email messages aren’t always what they seem. We talk often about how hackers obfuscate text and code within messages. That can be an effective way to bypass security...

Read more

Playing Email Whack-a-Mole

Ever feel like you're playing whack-a-mole when it comes to your email security? Ever feel like you're Bill Murray chasing after that gopher?

Read more

Leaders Lead

Avanan started in 2015 with a simple premise, that securing email in the cloud required a new approach. We did that with our patented solution, securing Microsoft 36...

Read more

Gateways and the Internal Attack

Proofpoint ,Mimecast, Barracuda and IronPort are traditional email security gateways that redirect traffic through a cloud-based proxy before it reaches the email se...

Read more

Zero-Click Attack: The Terminal Blow to Post-Delivery Email Security

The Check Point and Avanan ethos has always been Prevention First. We've explained to customers the importance of blocking attacks before an end-user has a chance to...

Read more

Why an API Deployment is Superior to Gateways

The majority of companies still use legacy gateways to protect their email. More and more, however, companies, are realizing the limitations of this approach, was or...

Read more

The Fundamentals of Good Email Security

Before email services like Office 365 and Gmail became popular, gateway architecture was the only deployment model for email security. Unfortunately, it is just not ...

Read more

The Triplet Trends of Cybersecurity

Let’s be honest. From being a noun or a verb to describing social media or fashion, “what’s trending” is a term gaining steam. However, whether the trend is popular,...

Read more

The Microsoft Reply Attack

One of the most spoofed brands in phishing attacks is Microsoft.

Read more

Avanan Customers Protected Against Novel Attack On Microsoft 365 (CVE-2023-23397)

Avanan customers are protected against a new vulnerability, CVE-2023-23397.

Read more

How is Your Email Security Stopping BEC?

Business Email Compromise (BEC) attacks have overwhelmed traditional email security providers because they don’t rely on URLs or malicious attachments to compromise ...

Read more

How Are Your Vendors Quarantining a Compromised Account?

Email gateways were designed to scan and block inbound messages. Their visibility and enforcement is limited to just email. They are unable to take action against an...

Read more

Are You Blocking Insider Attacks Before the Inbox?

According to Gartner, only 7% of organizations inspect their internal email. This is despite the fact that the last five years have seen a rise in internal threat ac...

Read more

Why Do SEGs Disable Microsoft or Google Security?

Both Microsoft 365 and G-Suite include their own email filters for spam, phishing and malware. When you deploy an external email gateway, however, you must put them ...

Read more

Have You Seen These Phishing Attacks? If So, Beware

We see phishing campaigns all the time--dedicated, long-standing attempts to hit end-users.

Read more

The Cloud Storage Re-Up Attack

Hackers always try to prey on end-users’ fear, uncertainty, and doubt. It’s all about tricking end-users into doing something they don’t want to do–namely, handing o...

Read more

How is Your SOC Handling Phishing?

Do you have a handle on how your SOC is handling phishing? More specifically, do you know how they are responding to end-user requests to restore messages and report...

Read more

How Does Ransomware Spread?

Ransomware. The word is enough to send shivers down any IT professional's spine.

Read more

CISOs Grow Increasingly Concerned About Email Security

The state of email security is a growing concern among IT and security decision-makers.

Read more

Why Do Governments Get Hacked So Often?

Governments are among the most attacked industries in the world. Why? Because they hold incredible amounts of data. That data is gold for hackers.

Read more

URL-Based Phishing On the Rise

Traditional phishing emails have followed the same set-up for decades – a malicious attachment or URL embedded in the email.

Read more

BEC 3.0 - Legitimate Sites for Illegitimate Purposes 

Security services have a problem and it’s called BEC 3.0.

Read more

Beware of the Microsoft Voice Scam

Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers.

Read more

The Used Car Salesperson of Email Security

We have all had the unpleasant experience of dealing with a used car salesperson. We all know the drill. They try to strongarm you with multiple different tactics th...

Read more

Phishing Remains the Key Vector

An individual’s inbox is a mixture of personal and professional information that many organizations feel is safe with complex passwords and security questions.

Read more

BEC 2.0 - Conversation Hijacking Exploits Accounting Teams into Payment Remittance  

One of the most financially devastating attacks is Business Email Compromise (BEC). In 2021, the FBI found that BEC-related complaints added up to $2.4 billion. For ...

Read more

Business Email Compromise Scam Leads to Credential Harvesting Evernote Page

Business Email Compromise attacks are one of the fastest-growing and most difficult-to-stop attacks in the cybersecurity space. There are a number of variants, but i...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial