5 Questions Your Secure Email Gateway Vendor Hopes You Never Ask

If you use Microsoft 365 or G-Suite and are considering a Secure Email Gateway , these are the 5 questions you must ask every vendor. You won't find the answers in t...

Read more

What is a Whaling Attack? The Definitive Guide

What is a Whaling Attack? A whaling attack is a specialized attack that falls under the larger category of spear phishing. Before we can define what whaling is, it’s...

Read more

The Twitter attack reminds us the perils of internal threats

Twitter Hack: Attackers Gained Access Via Stolen Credentials

The Twitter attack that saw a number of major accounts—like Joe Biden, Barack Obama, Elon Musk and other celebrities—overtaken and hacked was done via a spear phishi...

Read more

Microsoft 365 is Officially the Most Targeted Platform for Hackers

A new report confirms what has long been assumed: Microsoft Office is now the most targeted platform for hackers.

Read more

Companies Are Ditching Secure Email Gateways. This is Why.

Secure Email Gateways were built for on-premises use and in that capacity they worked well. But ask yourself: when was the last time your email was on-premises? It's...

Read more

SiteCloak Phishing: Office 365's Safe Links is Under Attack

Highlights: Attackers have expanded the battleground from the inbox to the web This is the hacker’s response to click-time protection and the technique is able to by...

Read more

No Longer Frustrated: The Long Overdue Change from Mimecast to Avanan

Highlights: After years of being frustrated with Mimecast, on everything from customer service to its inability to stop simple-seeming attacks, this benefits adminis...

Read more

Calming the Seas: How a Biotech Research Firm Took Back Control With Avanan

Highlights: After being whalephished and inundated with attacks while using Proofpoint, this biotech firm switched to Avanan, and the attacks stopped Avanan gave a n...

Read more

SiteCloak Link Attack: Email URL Obfuscation Techniques

We are seeing a rise in the number of phishing attacks that bypass Office 365 due to the attackers’ use of obfuscation techniques on the credential harvesting websit...

Read more

SYLKin Attack: New Malicious .slk files are bypassing Microsoft 365 Security, Risking 200M+ Users

A new attack method bypasses both Microsoft 365 default security (EOP) and advanced security (ATP). At the time of writing, Microsoft 365 is still vulnerable and the...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial