Jeremy Fuchs

Jeremy Fuchs



The Worst Case Scenario With Other API Solutions

As we've written about before, there are two types of API-based email security solutions. There's one method, which only remediates malicious emails after it reaches...

Read more

Microsoft ATP's Filter as Spam Issue

One issue that Microsoft ATP users have is with configurations—or misconfigurations. For example, as discussed on this Reddit thread, even when users set, by policy,...

Read more

Defense-in-Depth: Why the Legacy Model Doesn't Hold Up

One of the things that Avanan really believes in is defense-in-depth. It's not enough to have just one layer of defense. Enterprises need multiple layers. If an atta...

Read more

New Attack Spoofs Amazon to Obtain Payment From End-User

As holiday shopping begins earlier this year due to supply chain issues, many are beginning to stock up, especially from Amazon. For hackers, it’s an opportunity to ...

Read more

Social Media Spoofing Gains Popularity with Hackers

For the first time this year, according to Check Point Research, social media was among the top three sectors to be imitated via phishing. In their quarterly list of...

Read more

Send Info. Hope for Money. Get Phished Instead.

Last week, we wrote about a scam that spoofs the World Health Organization (WHO) in the hopes of grabbing personal information.

Read more

Complete Malware Protection Keeps You Safer

According to the Verizon Data Breach Investigation Report (DBIR), 20 percent of malware attacks are launched via email attachments. In addition, emails links, accord...

Read more

The BCC Attack

A simple, but effective, way to bypass traditional scanners is by adding the recipient as a BCC.

Read more

WHO Are You? Hackers Spoof World Health Organization

As governments around the world have paid out relief checks during the COVID-19 crisis, it might seem reasonable to receive some form of email communication from gov...

Read more

API-Based Email Security: Why Comprehensive URL Scanning is Essential

Many attacks detonate post-delivery, meaning they easily get by email scanners and are only dangerous after the user clicks on the link. URL rewriting, along with ti...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial