Defense-in-Depth: Why the Legacy Model Doesn't Hold Up

One of the things that Avanan really believes in is defense-in-depth. It's not enough to have just one layer of defense. Enterprises need multiple layers. If an atta...

Read more

New Attack Spoofs Amazon to Obtain Payment From End-User

As holiday shopping begins earlier this year due to supply chain issues, many are beginning to stock up, especially from Amazon. For hackers, it’s an opportunity to ...

Read more

Social Media Spoofing Gains Popularity with Hackers

For the first time this year, according to Check Point Research, social media was among the top three sectors to be imitated via phishing. In their quarterly list of...

Read more

Send Info. Hope for Money. Get Phished Instead.

Last week, we wrote about a scam that spoofs the World Health Organization (WHO) in the hopes of grabbing personal information.

Read more

Complete Malware Protection Keeps You Safer

According to the Verizon Data Breach Investigation Report (DBIR), 20 percent of malware attacks are launched via email attachments. In addition, emails links, accord...

Read more

The BCC Attack

A simple, but effective, way to bypass traditional scanners is by adding the recipient as a BCC.

Read more

WHO Are You? Hackers Spoof World Health Organization

As governments around the world have paid out relief checks during the COVID-19 crisis, it might seem reasonable to receive some form of email communication from gov...

Read more

API-Based Email Security: Why Comprehensive URL Scanning is Essential

Many attacks detonate post-delivery, meaning they easily get by email scanners and are only dangerous after the user clicks on the link. URL rewriting, along with ti...

Read more

As Vaccine Mandates Spread, So Too Do Vaccine Scams

As long as COVID-19 vaccines have been readily available, there have been scammers looking to profit from it. According to Check Point Research, the following have b...

Read more

API-Based Email Security: Why You Need Content Disarm & Reconstruction

The majority of ransomware and malware starts with phishing. In fact, according to Check Point, more than 70% of malicious email attachments or links were sent via P...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial