The Email Security Blog

Authentication Breach Alert: OAuth Flaw Enables “Perfect Phishing” Campaign

A sophisticated phishing campaign exploiting authentication vulnerabilities in a major email service provider has security leaders on alert, as threat actors demonst...

Read more

Man reviewing email security programs at desk in office

How Check Point’s AI-Powered Phishing SIM is Reshaping Security Awareness

More than 90% of cyber attacks start with a malicious email. Although security leaders need to invest heavily in technical controls, they also need to attend to the ...

Read more

Competition

When Competitors are Good

I bet you would never have guessed you’d hear those words out of my mouth. But the truth really is competition makes us all better. With competition we are incented ...

Read more

Authentication Breach Alert: OAuth Flaw Enables “Perfect Phishing” Campaign

A sophisticated phishing campaign exploiting authentication vulnerabilities in a major email service provider has security leaders on alert, as threat actors demonst...

Read more

Invoice Fraud: A Growing Threat to SMBs in 2025

In a troubling trend sweeping across the business landscape, cyber criminals are turning to invoice fraud in order to target small and medium-sized businesses. These...

Read more

PoisonSeed Campaign: New Supply Chain Phishing Attack Targets CRM and Email Providers

Overview: A sophisticated new supply chain attack, dubbed PoisonSeed, is systematically compromising customer relationship management (CRM) and bulk email providers ...

Read more

Morphing Meerkat: An Advanced Phishing Platform

Since the initial discovery of Morphing Meerkat, a Phishing-as-a-Service (PhaaS) platform first identified in 2020, the platform has evolved significantly.

Read more

Healthcare Data Breaches Reflect Need for Cyber Security Refresh

In 2024, 259 million Americans, or 76% of the population, experienced the effects of health-related data breaches. Nearly 50% of cyber security professionals in the ...

Read more

Threat Analysis: Phishing Campaign Targets Google Account Credentials

Cyber criminals have launched a sophisticated phishing campaign that exploits the trusted reputation of Semrush — an SEO firm that's captured 40% of Fortune 500 bran...

Read more

The Dark Side of QR Codes: Business Impact of Quishing

Around the world, organizations are leveraging QR codes to simplify the way in which they conduct business. Whether that means offering QR code-based rebates, coupon...

Read more

1 2 3 4 5
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial