The Email Security Blog

The Problem with Blinding Default Security

Customers that use gateways like Mimecast, Proofpoint, Barracuda and IronPort might be susceptible to email attacks that other Office 365 and Gmail customers are not...

Read more

The Replier Attack

Email messages aren’t always what they seem. We talk often about how hackers obfuscate text and code within messages. That can be an effective way to bypass security...

Read more

Playing Email Whack-a-Mole

Ever feel like you're playing whack-a-mole when it comes to your email security? Ever feel like you're Bill Murray chasing after that gopher?

Read more

Leaders Lead

Avanan started in 2015 with a simple premise, that securing email in the cloud required a new approach. We did that with our patented solution, securing Microsoft 36...

Read more

Gateways and the Internal Attack

Proofpoint ,Mimecast, Barracuda and IronPort are traditional email security gateways that redirect traffic through a cloud-based proxy before it reaches the email se...

Read more

Zero-Click Attack: The Terminal Blow to Post-Delivery Email Security

The Check Point and Avanan ethos has always been Prevention First. We've explained to customers the importance of blocking attacks before an end-user has a chance to...

Read more

Why an API Deployment is Superior to Gateways

The majority of companies still use legacy gateways to protect their email. More and more, however, companies, are realizing the limitations of this approach, was or...

Read more

The Fundamentals of Good Email Security

Before email services like Office 365 and Gmail became popular, gateway architecture was the only deployment model for email security. Unfortunately, it is just not ...

Read more

The Triplet Trends of Cybersecurity

Let’s be honest. From being a noun or a verb to describing social media or fashion, “what’s trending” is a term gaining steam. However, whether the trend is popular,...

Read more

The Microsoft Reply Attack

One of the most spoofed brands in phishing attacks is Microsoft. 

Read more

Avanan Customers Protected Against Novel Attack On Microsoft 365 (CVE-2023-23397)

Avanan customers are protected against a new vulnerability, CVE-2023-23397.

Read more

How is Your Email Security Stopping BEC?

Business Email Compromise (BEC) attacks have overwhelmed traditional email security providers because they don’t rely on URLs or malicious attachments to compromise ...

Read more

How Are Your Vendors Quarantining a Compromised Account?

Email gateways were designed to scan and block inbound messages. Their visibility and enforcement is limited to just email. They are unable to take action against an...

Read more

Are You Blocking Insider Attacks Before the Inbox?

According to Gartner, only 7% of organizations inspect their internal email. This is despite the fact that the last five years have seen a rise in internal threat ac...

Read more

Why Do SEGs Disable Microsoft or Google Security?

Both Microsoft 365 and G-Suite include their own email filters for spam, phishing and malware. When you deploy an external email gateway, however, you must put them ...

Read more

Have You Seen These Phishing Attacks? If So, Beware

We see phishing campaigns all the time--dedicated, long-standing attempts to hit end-users.

Read more

The Cloud Storage Re-Up Attack

Hackers always try to prey on end-users’ fear, uncertainty, and doubt. It’s all about tricking end-users into doing something they don’t want to do–namely, handing o...

Read more

How is Your SOC Handling Phishing?

Do you have a handle on how your SOC is handling phishing? More specifically, do you know how they are responding to end-user requests to restore messages and report...

Read more

1 2 3 4 5
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial