The Email Security Blog

World Cup Starts...And So Does World Cup Phishing

The World Cup is underway, with wall-to-wall soccer on tap for the next month.

Read more

New Attack Showcases Importance of Full-Suite Security

Researchers have uncovered a state-sponsored hacking campaign that uses Google accounts to send emails, and then uses a Google Drive or Dropbox folder as the mechani...

Read more

The Different Types of Ransomware

Ransomware is a top-of-mind security concern for many organizations. However, not all ransomware attacks are the same. A number of different ransomware variants are ...

Read more

Emotet Malware

Emotet is a sophisticated, self propagating Trojan . While Emotet began as a banking trojan, its modular design has allowed it to evolve into a distributor for other...

Read more

Black Friday Scams Are Beginning

It’s the most wonderful time of year. Family. Post-turkey malaise. Shopping. Phishing scams.

Read more

How Should Companies Handle Ransomware?

In 2021, high-profile ransomware attacks, such as the Colonial Pipeline and Kaseya hacks, caused significant disruptions to supply chains and companies’ operations.

Read more

Avanan Named a Tech Innovator in Email Security By CRN

Avanan is proud to receive the 2022 Tech Innovator Award in Email Security from CRN.

Read more

Avanan Recieves 5-Star Rating from Expert Insights

Avanan received a 5-star review from Expert Insights.

Read more

Let Avanan's Email Experts Give You Time Back

Avanan's Incident Response-as-a-Service (IRaaS) uses our team of highly-trained, Tier 2 security analyst experts to review end-user requests to release emails from q...

Read more

How Hackers Target Nations

According to Check Point research, the second-most targeted industry in the world is the government sector. In the third quarter of this year, governments were on th...

Read more

Human-Operated Ransomware

Ransomware has emerged as a dominant cyber threat and one of the most expensive types of cyberattacks that an organization can fall victim to. However, not all ranso...

Read more

The Millisecond Myth, Exposed

By now, the differences between Avanan and other API-based solutions are clear:

Read more

Abusing Microsoft Customer Voice to Send Phishing Links

Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers. 

Read more

What is a Vishing Attack?

Vishing – a portmanteau of voice and phishing – attacks are performed over the phone, and are considered a type of a social engineering attack, as they use psycholog...

Read more

How Black Basta Ransomware Group Starts Their Attack

A new group, Black Basta, is making head waves in the ransomware game. Since May 2022, according to Check Point Research, there have been at least 89 high-profile or...

Read more

BEC on the Rise: How to Defend Against It

Arctic Wolf recently published a survey of attacks from the first half of 2022 and found that there was a significant uptick in Business Email Compromise attacks. 

Read more

DLP is an Essential Task of Email and Collaboration Security

Whenever a company holds data, there is a chance for a breach. And since companies continue to hold valuable data of all kinds, it is becoming more costly for a brea...

Read more

Sending Trojans via Scanners

Scanners may seem like a relic of the old days–and certainly of the days of working consistently from an office.

Read more

Global Cyber Threats On the Rise

Global threats on are the rise. Check Point Research has noted a 28% increase in the third quarter of 2022, compared to the same period in 2021. 

Read more

DHL Takes the Brand Phishing Crown

In an award no one wants to win, DHL is now the most impersonated brand in phishing attacks.

Read more

1 2 3 4 5
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial