As we've written about before, there are two types of API-based email security solutions. There's one method, which only remediates malicious emails after it reaches...
As we've written about before, there are two types of API-based email security solutions. There's one method, which only remediates malicious emails after it reaches...
One issue that Microsoft ATP users have is with configurations—or misconfigurations. For example, as discussed on this Reddit thread, even when users set, by policy,...
One of the things that Avanan really believes in is defense-in-depth. It's not enough to have just one layer of defense. Enterprises need multiple layers. If an atta...
As holiday shopping begins earlier this year due to supply chain issues, many are beginning to stock up, especially from Amazon. For hackers, it’s an opportunity to ...
For the first time this year, according to Check Point Research, social media was among the top three sectors to be imitated via phishing. In their quarterly list of...
Last week, we wrote about a scam that spoofs the World Health Organization (WHO) in the hopes of grabbing personal information.
According to the Verizon Data Breach Investigation Report (DBIR), 20 percent of malware attacks are launched via email attachments. In addition, emails links, accord...
A simple, but effective, way to bypass traditional scanners is by adding the recipient as a BCC.
As governments around the world have paid out relief checks during the COVID-19 crisis, it might seem reasonable to receive some form of email communication from gov...
Many attacks detonate post-delivery, meaning they easily get by email scanners and are only dangerous after the user clicks on the link. URL rewriting, along with ti...