One of the things that Avanan really believes in is defense-in-depth. It's not enough to have just one layer of defense. Enterprises need multiple layers. If an atta...
One of the things that Avanan really believes in is defense-in-depth. It's not enough to have just one layer of defense. Enterprises need multiple layers. If an atta...
As holiday shopping begins earlier this year due to supply chain issues, many are beginning to stock up, especially from Amazon. For hackers, it’s an opportunity to ...
For the first time this year, according to Check Point Research, social media was among the top three sectors to be imitated via phishing. In their quarterly list of...
Last week, we wrote about a scam that spoofs the World Health Organization (WHO) in the hopes of grabbing personal information.
According to the Verizon Data Breach Investigation Report (DBIR), 20 percent of malware attacks are launched via email attachments. In addition, emails links, accord...
A simple, but effective, way to bypass traditional scanners is by adding the recipient as a BCC.
As governments around the world have paid out relief checks during the COVID-19 crisis, it might seem reasonable to receive some form of email communication from gov...
Many attacks detonate post-delivery, meaning they easily get by email scanners and are only dangerous after the user clicks on the link. URL rewriting, along with ti...
As long as COVID-19 vaccines have been readily available, there have been scammers looking to profit from it. According to Check Point Research, the following have b...
The majority of ransomware and malware starts with phishing. In fact, according to Check Point, more than 70% of malicious email attachments or links were sent via P...