When hackers find something that works, they keep going at it until it doesn't.
When hackers find something that works, they keep going at it until it doesn't.
Last week, we published an Attack Brief that highlighted how hackers are spoofing Walgreens.
G2 announced their Best Security Products List of 2022.
ThreatCloud, Check Point's threat intelligence repository, does 86 billion transactions a day.
At Avanan, we have a saying: Don't take our word for it.
In 2021, hackers were more productive than ever. In 2021, according to Check Point Research, over 10,000 new malicious files and 100,000 new malicious websites were ...
PowerPoint has a number of add-on files that add features and capabilities. One of these is the .ppam file.
Back when email was on-prem, Secure Email Gateways were the standard. They protected your email server, using a security stack designed specifically for on-prem emai...
Spoofing brands is an effective way for phishers to get into the inbox and to convince end-users to click.
For Avanan, we always like to say the proof is in the pudding. Don't just trust our word for it. Trust the product in action and trust the customers who use it and l...