If you use Microsoft 365 or G-Suite and are considering a Secure Email Gateway , these are the 5 questions you must ask every vendor. You won't find the answers in t...
If you use Microsoft 365 or G-Suite and are considering a Secure Email Gateway , these are the 5 questions you must ask every vendor. You won't find the answers in t...
What is a Whaling Attack? A whaling attack is a specialized attack that falls under the larger category of spear phishing. Before we can define what whaling is, it’s...
The Twitter attack that saw a number of major accounts—like Joe Biden, Barack Obama, Elon Musk and other celebrities—overtaken and hacked was done via a spear phishi...
A new report confirms what has long been assumed: Microsoft Office is now the most targeted platform for hackers.
Secure Email Gateways were built for on-premises use and in that capacity they worked well. But ask yourself: when was the last time your email was on-premises? It's...
Highlights: Attackers have expanded the battleground from the inbox to the web This is the hacker’s response to click-time protection and the technique is able to by...
Highlights: After years of being frustrated with Mimecast, on everything from customer service to its inability to stop simple-seeming attacks, this benefits adminis...
Highlights: After being whalephished and inundated with attacks while using Proofpoint, this biotech firm switched to Avanan, and the attacks stopped Avanan gave a n...
We are seeing a rise in the number of phishing attacks that bypass Office 365 due to the attackers’ use of obfuscation techniques on the credential harvesting websit...
A new attack method bypasses both Microsoft 365 default security (EOP) and advanced security (ATP). At the time of writing, Microsoft 365 is still vulnerable and the...