The Email Security Blog

New Phishing Campaign Exploiting Google App Scripts: What Organizations Need to Know

Cyber security researchers from Avanan have recently identified a concerning phishing campaign that leverages Google Apps Script macros – a tool used to automate tas...

Read more

AI-powered BEC Attacks Overruning Organizations Without AI Solutions

What is a BEC Threat? Business Email Compromise (BEC) is a type of cyber threat that aims to manipulate people into acting in the interests of a cyber criminal. Thes...

Read more

SaaS companies spoofed in nearly undetectable new phishing campaigns

EXECUTIVE SUMMARY: Software-as-a-Service platforms and their clients face an insidious type of phishing-based threat. Organizations that fail to get ahead of it can ...

Read more

Relentless Cyber Security: Making Sense of the CrowdStrike Disruption

The recent global computer outage caused by a CrowdStrike update stands as a poignant reminder of the profound pressures faced by professionals in this field. While ...

Read more

Zero-Click Attacks

Latest Zero-Click Attack in Outlook Delivers Instant Malware

Earlier this year, we reported on Zero-Click Attacks in Microsoft Outlook that could compromise a user without them taking any action. Cyber Security News recently r...

Read more

BEC 4.0: Business Communication Compromise 

Microsoft Teams is a popular communication channel for many organizations.

Read more

The Evolution of QR Code Phishing: ASCII-Based QR Codes 

Quishing—QR code phishing—is a rapidly evolving threat. Starting around August, when we saw the first rapid increase, we’ve also seen a change in the type of QR code...

Read more

What You Need to Know from the 2024 Verizon Data Breach Investigations Report

The 2024 Verizon Data Breach Investigations Report (DBIR) is always one of the most hotly anticipated cyber security reports and this year it has been released chock...

Read more

Innovation Continues with the Unified Quarantine

When it comes to innovation in email security, no one can come close to our track record.

Read more

Spoofing Shein for Credential Harvesting 

Shein is one of the most popular shopping apps in the world. In fact, it’s the second most downloaded shopping app globally, with over 251 million downloads.

Read more

1 2 3 4 5
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial