How Hackers Follow Up Successful Campaigns

When hackers find something that works, they keep going at it until it doesn't.

Read more

Hackers Find Success Spoofing Walgreens, Keep At It

Last week, we published an Attack Brief that highlighted how hackers are spoofing Walgreens.

Read more

Avanan Ranks Fourth on G2's List of Top Security Products

G2 announced their Best Security Products List of 2022.

Read more

ThreatCloud's Scale is Unmatched

ThreatCloud, Check Point's threat intelligence repository, does 86 billion transactions a day.

Read more

This is What Analysts Say About Avanan

At Avanan, we have a saying: Don't take our word for it.

Read more

The Workforce Security Report

In 2021, hackers were more productive than ever. In 2021, according to Check Point Research, over 10,000 new malicious files and 100,000 new malicious websites were ...

Read more

Using .ppam Files to Wrap Executable Content

PowerPoint has a number of add-on files that add features and capabilities. One of these is the .ppam file.

Read more

How Avanan is Different than SEGs

Back when email was on-prem, Secure Email Gateways were the standard. They protected your email server, using a security stack designed specifically for on-prem emai...

Read more

Walgreens Spoof Leads to Credential Harvesting

Spoofing brands is an effective way for phishers to get into the inbox and to convince end-users to click.

Read more

Don't Take Our Word For It. Take Theirs

For Avanan, we always like to say the proof is in the pudding. Don't just trust our word for it. Trust the product in action and trust the customers who use it and l...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial