Last week, we wrote about how hackers are utilizing Google Looker Studio to carry out phishing campaigns.
Last week, we wrote about how hackers are utilizing Google Looker Studio to carry out phishing campaigns.
HTML and HTM attachments make up 50% of malicious attachments. Why are hackers resorting to this attachment form? In this video, we break it down:
Microsoft Teams is quickly becoming a burgeoning attack vector. We've written about a few new attacks recently. In this video, we break down one of them:
Today, we’re writing about cyberattacks we’re seeing via Google Looker Studio and other Google applications. Google Looker Studio is a powerful data visualization so...
By now, you know full well what BEC is. It's receiving a message, usually from someone pretending to be a higher-up, and asking for information. These are incredibly...
Zelle, the money-transfer service, is a favorite of hackers to spoof. We've written about it in detail. In this video, we walk you through what a typical Zelle scam ...
Interested in switching from your SEG and moving on to Avanan? The transition in super easy. Here's how you do it:
Whack-a-Mole is fun at the arcade--less fun if it's a staple of your email security program. But with many API solutions, playing whack-a-mole is the only option. An...
The word ransomware is enough to cause fear in any organization. But it doesn't have to be fear-inducing. Our guide provides five security measures that you can impl...
Business Email Compromise is the most financially damaging phishing attack in cybersecurity. How can your organization ensure it doesn't cause damage? This is a guid...