Check Point Customers Protected from CVSS 9.8 Moniker Link Bug

New research by Check Point has found a significant security vulnerability in Microsoft Outlook, known as the #MonikerLink bug. The bug exploits the way Outlook proc...

Read more

5 Quick Tweaks to Improve Email Security

Are you frustrated with the lack of effectiveness in your email security measures? Despite investing in various solutions, you may still be vulnerable to cyber threa...

Read more

Spoofing Temu for Credential Harvesting

Temu, an international online e-commerce store that has quickly gained prominence, offers discounted goods directly shipped to consumers without intermediate distrib...

Read more

Beware of Invoice Phishing: 5 Tips to Stay Safe

Phishing attacks have become increasingly sophisticated, and one of the latest threats targeting Microsoft 365 users is the fake invoice phishing scam. This scam aim...

Read more

3 Reasons Why Account Takeover Protection is an Important Part of Email Security

Account takeover is a growing concern in the world of email security. Cybercriminals are constantly finding new ways to gain unauthorized access to email accounts, a...

Read more

Fake Voicemail as Credential Harvesting Lure

Hackers will try just about anything to get you to click on a malicious link.

Read more

Conditional QR Code Routing Attacks

Over the summer, we saw a somewhat unexpected rise in QR-code-based phishing attacks.

Read more

Top Impersonated Brands in Phishing

Q4 2023 has come and gone, but the threat of phishing attacks remains on the rise, with "brand phishing" taking the lead. According to Check Point's 2024 Brand Phish...

Read more

Understanding the Risks: How Your Outlook Inbox Can Be a Gateway for Cyber Attacks

In the digital age, email has become an indispensable tool for communication, especially within organizations. Services like Outlook are integral for scheduling meet...

Read more

Ransomware Continues Meteoric Rise

It is officially 2024, and hearing the phrase, "new year, new you," is expected and typically indicates change (e.g., bad habits, personal development, exercise, etc...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial