The Importance of Flexible Deployments

In today's rapidly evolving digital landscape, email remains a critical artery of communication for organizations worldwide. However, this indispensable tool is also...

Read more

Understanding AI in Email Security: Beyond the Hype

As we navigate deeper into the digital age, the omnipresence of AI (Artificial Intelligence) in cybersecurity narratives has become undeniable. With every vendor cla...

Read more

Navigating the Evolution of Email Security: From Gateways to AI-Driven Cloud Solutions

The digital transformation journey has led many organizations toward cloud-based email systems, a move that has significantly altered the cybersecurity landscape. Th...

Read more

New Third-Party Evaluation Showcases HEC's Effectiveness

Miercom assessed the five top security vendors' Zero Trust Platforms, comparing their security efficacy, ease of use, breadth and comprehensiveness.

Read more

HEC Combines Best-in-Class Phishing with Best-in-Class Malware Protection 

Ransomware and malware remain a primary concern for organizations. In 2023, 1 in every 10 organizations worldwide was hit with an attempted ransomware attack, a 33% ...

Read more

Microsoft's Clever Trick Beats Google's Guard: A Simple Guide to Cybersecurity's Latest Discovery

Mail Exchange records—or MX Records—is a public way of notating the mail server responsible for receiving and sending messages. Think of it like a public address, si...

Read more

Check Point Customers Protected from CVSS 9.8 Moniker Link Bug

New research by Check Point has found a significant security vulnerability in Microsoft Outlook, known as the #MonikerLink bug. The bug exploits the way Outlook proc...

Read more

5 Quick Tweaks to Improve Email Security

Are you frustrated with the lack of effectiveness in your email security measures? Despite investing in various solutions, you may still be vulnerable to cyber threa...

Read more

Spoofing Temu for Credential Harvesting

Temu, an international online e-commerce store that has quickly gained prominence, offers discounted goods directly shipped to consumers without intermediate distrib...

Read more

Beware of Invoice Phishing: 5 Tips to Stay Safe

Phishing attacks have become increasingly sophisticated, and one of the latest threats targeting Microsoft 365 users is the fake invoice phishing scam. This scam aim...

Read more

3 Reasons Why Account Takeover Protection is an Important Part of Email Security

Account takeover is a growing concern in the world of email security. Cybercriminals are constantly finding new ways to gain unauthorized access to email accounts, a...

Read more

Fake Voicemail as Credential Harvesting Lure

Hackers will try just about anything to get you to click on a malicious link.

Read more

Conditional QR Code Routing Attacks

Over the summer, we saw a somewhat unexpected rise in QR-code-based phishing attacks.

Read more

Top Impersonated Brands in Phishing

Q4 2023 has come and gone, but the threat of phishing attacks remains on the rise, with "brand phishing" taking the lead. According to Check Point's 2024 Brand Phish...

Read more

Understanding the Risks: How Your Outlook Inbox Can Be a Gateway for Cyber Attacks

In the digital age, email has become an indispensable tool for communication, especially within organizations. Services like Outlook are integral for scheduling meet...

Read more

Ransomware Continues Meteoric Rise

It is officially 2024, and hearing the phrase, "new year, new you," is expected and typically indicates change (e.g., bad habits, personal development, exercise, etc...

Read more

The Rise of Phishing Attacks with Crypto Drainers

A new report by Check Point Research illustrates a concerning rise in advanced phishing attacks that target blockchain networks by using wallet-draining techniques.

Read more

Zero-Click Attacks Continue to Proliferate

In March of 2023, Microsoft confirmed a zero-click attack in Outlook that would compromise the end-user without them doing anything. They don’t need to click a link ...

Read more

Stop Zero-Day Malware in its Tracks

Would you believe that many API-based email security solutions don't look at malware?

Read more

How to Inspect Encrypted Attachments

Many Phishing attacks include password-protected attachments as a means to avoid inspection. These attacks often employ very simple techniques to prevent security so...

Read more

How to Keep Spam and Phishing Out of the Inbox

You have a spam and phishing problem.

Read more

Secure Your Email in a Few Clicks

Need to improve your email security? It doesn't take long. In just a few clicks, you can set up Avanan and immediately see the results. Don't believe us? See it for ...

Read more

Phishing via Google Forms

We’ve been writing extensively about BEC 3.0 attacks.

Read more

The Rise in Email Phishing Attacks Amidst the Israel-Hamas Conflict  

Threat actors have long taken advantage of current events -- from natural disasters to regional holidays and cultural moments -- to deceive people.

Read more

Extending QR Code Phishing Capabilities with Link Rewriting

Recently, we've seen a large rise in QR-code, or Quishing, attacks. These QR codes are delivered via email and contain a link to a malicious credential harvesting pa...

Read more

Manage Spam With Intelligent AI

One person's spam is another person's newsletter. These differing opinions in how end-users view emails fall into a larger category called graymail. It could be a sp...

Read more

QR Code Attacks Have Global Reach 

Cybercriminals are launching incredibly sophisticated "quishing” campaigns armed with malicious QR codes. Attack volumes have grown 2,400% since May, including an at...

Read more

The Rise in QR Code Attacks

Recently, we've seen a lot of news about Quishing--or QR Code phishing. This is when the link behind a QR code is malicious, but the QR code itself is not. There was...

Read more

Preventing QR Code Phishing: Increased Visibility for Admins

The hottest trend in the world of email security is quishing or QR Code phishing.

Read more

Account Takeover: The Bank Signature Change

When someone takes over an account via email, they usually do one of the following actions:

Read more

Introducing SmartVault: Secure Messaging for Microsoft 365

DLP serves as a crucial tool for preventing and controlling the sharing of sensitive information with external parties.

Read more

Account Takeover from Student Emails

Account takeovers happen when an outside actor gains access to an email account. This can happen through a number of ways, from standard brute force to more complex ...

Read more

Phishing via Google Collection

We've been continually writing about how hackers are utilizing Google as a springboard to launch phishing attacks. The latest version of this is through Google Colle...

Read more

BBTok: Analyzing Banking Malware

Recently, Check Point Research (CPR) made an alarming discovery in Latin America - an ongoing campaign deploying a fresh variant of the BBTok banking malware. This n...

Read more

Preventing QR Code Phishing From Reaching the Inbox

Recently, we've seen a lot of news about Quishing--or QR Code phishing. This is when the link behind a QR code is malicious, but the QR code itself is not. There was...

Read more

VIDEO: Phishing via Google Ads

We've been writing more and more about the ways in which hackers are utilizing Google services to launch phishing attacks. One of the ways they are doing this is by ...

Read more

Attack Breakdown: BEC in Action

BEC attacks are financially damaging and difficult to stop. It's why hackers continually launch these attacks. In this video, we break down one example of a BEC atta...

Read more

Account Takeover Attack: How This Hotel Almost Lost $50,000

In an account takeover (ATO) attack, an attacker gains unauthorized access to the credentials for a user’s online account. This access can then be used for identity ...

Read more

Breaking Down the Remcos Malware Attempts on Colombian Banks

Check Point researchers recently discovered a large-scale phishing campaign in Colombia targeting over 40 prominent companies. The attackers aimed to discreetly inst...

Read more

VIDEO: Phishing via Google Docs

We've written a lot recently about how Google services are being utilized by hackers as a springboard for carrying out phishing attacks. One of those services is Goo...

Read more

Breaking Down PayPal BEC 3.0 Scams

We've written a lot about how scammers are using PayPal for BEC 3.0 scams. This means tat hackers are sending invoices directly from PayPal, not a spoofed site. That...

Read more

Phishing via Adobe

We’ve been talking about it week after week—hackers are using legitimate services for illegitimate means.

Read more

Breaking Down ZeroFont Phishing Attacks

We first wrote about ZeroFont phishing a few years ago, and it remains one of our most viewed stories here. Why? Because it's an innovative technique that hackers ha...

Read more

Storm-0324 Threat Group Switches Phishing Tactics to Teams

A stunning new development in the world of Teams phishing was announced by Microsoft.

Read more

Another Teams Attack Highlights Importance of Full-Suite Security

A new phishing campaign is taking off in MIcrosoft Teams.

Read more

VIDEO: Phishing via Google Looker Studio

Last week, we wrote about how hackers are utilizing Google Looker Studio to carry out phishing campaigns.

Read more

A Deep Dive into HTML and HTM Attachment Phishing

HTML and HTM attachments make up 50% of malicious attachments. Why are hackers resorting to this attachment form? In this video, we break it down:

Read more

New Teams Attacks: A Harbinger of Potential Issues to Come

Microsoft Teams is quickly becoming a burgeoning attack vector. We've written about a few new attacks recently. In this video, we break down one of them:

Read more

Cyber Criminals Phishing via Google Looker Studio

Today, we’re writing about cyberattacks we’re seeing via Google Looker Studio and other Google applications. Google Looker Studio is a powerful data visualization so...

Read more

BEC in Personal Email

By now, you know full well what BEC is. It's receiving a message, usually from someone pretending to be a higher-up, and asking for information. These are incredibly...

Read more

Video: Spoofing Zelle to Steal Credentials

Zelle, the money-transfer service, is a favorite of hackers to spoof. We've written about it in detail. In this video, we walk you through what a typical Zelle scam ...

Read more

Switching from a SEG is Easier Than Ever

Interested in switching from your SEG and moving on to Avanan? The transition in super easy. Here's how you do it:

Read more

Don't Play SOC Whack-a-Mole with Phishing

Whack-a-Mole is fun at the arcade--less fun if it's a staple of your email security program. But with many API solutions, playing whack-a-mole is the only option. An...

Read more

5 Key Measures to Guard Against Ransomware

The word ransomware is enough to cause fear in any organization. But it doesn't have to be fear-inducing. Our guide provides five security measures that you can impl...

Read more

Getting a Grip on BEC

Business Email Compromise is the most financially damaging phishing attack in cybersecurity. How can your organization ensure it doesn't cause damage? This is a guid...

Read more

Solving 5 Key Security Issues

Our product is comprehensive, but our customers continually come to us for the following five key security issues.

Read more

Go Phish: The Email Security Video Game!

We're lucky to have a ton of talented employees here at Avanan. One of them, Sr. Solutions Engineer Michael Hansen, has a wide variety of skills, including coding. A...

Read more

How We Align with NIST

The NIST (National Institute of Standards and Technology) Cybersecurity Framework is a widely recognized framework that provides guidelines for improving the cyberse...

Read more

The SolarWinds Group is Moving Focus to Microsoft Teams

NOBELIUM--aka Midnight Blizzard, APT29, Cozy Bear--the group behind the sprawling SolarWinds attack, is at it again, with a new attack utilizing Teams.

Read more

Phishing via AWS

The hottest trend in the phishing world is leveraging legitimate services to send illegitimate messages.

Read more

Phishing via SharePoint

We’ve been writing recently about how hackers are utilizing legitimate services to send out phishing campaigns.

Read more

Slack is a DLP Nightmare. Here's How We Handle It

One of our customers uses Slack for a lot of their daily communication. The company holds a lot of data about customers, and often this is shared internally to facil...

Read more

Phishing via Google Ads

Ads make the internet go round. And nobody does more with online ads than Google.

Read more

Phishing via Google Collections

Google Collection is a cool tool that allows you to save links, images and videos and share them with others.

Read more

The Automatic Forwarding Problem in Action

Last year, we wrote about a story we heard. Someone who was using an API-based competitor for email security told us about a mail rule they have: every email that go...

Read more

To Be Granular or Not: With Avanan, That Isn't a Question

According to our own Michael Hansen, one of our Security Engineers, "One user's newsletter is another user's spam."

Read more

The NATO Summit Email Attack: What You Need to Know

Executive Summary A new cyber attack targeting NATO countries supporting Ukraine during the NATO Summit shows why only a comprehensive email security solution can st...

Read more

Google Docs Phishing

Using the comment feature in Google Docs represents another instance in the evolution of BEC 3.0. Utilizing legitimate sites makes it easy for hackers to end up in t...

Read more

URL-Based Phishing: Fake Louis Vuitton

Phishing through URL-based scams is a deceitful tactic used by hackers to obtain confidential information from users by creating fake links that mimic legitimate one...

Read more

30 Years of Cyber Leadership

This month, Check Point celebrated 30 years as a company. This is an incredible achievement for any company.

Read more

Teams Attacks Continue to Spread

Last week, we wrote about a new Teams malware variant making the rounds. As we wrote, the vulnerability essentially allows hackers to bypass all security measures an...

Read more

Finding Phishing Help via Facebook

Cybercriminals have a sneaky technique up their sleeves - brand phishing, also known as brand impersonation or brand spoofing. This tactic involves assuming the iden...

Read more

New Teams Attack Delivers Instant Malware

A recently discovered vulnerability in Microsoft Teams has opened the door for non-employees to effortlessly send harmful files to employees without undergoing any s...

Read more

Phorm Phishing: Using Form Service APIs to Steal Credentials

In recent months, Check Point Research has observed a surge in phishing attacks that exploit reputable online form builder services like Formspark, Formspree, EmailJ...

Read more

The Unified Quarantine: Saving the SOC Team Time and Frustration

It is widely acknowledged in the market that organizations require an extra layer of email security to complement Microsoft's existing protection.

Read more

PDF-Based Attacks on the Rise: Here's How Deep Learning Can Prevent Them

In June, 43% of all malicious files were PDFs, indicating a significant rise in their use for malicious purposes.

Read more

Artificial Intelligence in Cybersecurity: How Check Point's ThreatCloud AI Works

Mark Ostrowski is Head of Engineering, US East, Check Point. He has 20 years’ experience in IT security and has helped design and support some of the largest securit...

Read more

URL-Based Phishing: The Fake Meta Mask Page

URL-based phishing tricks users into providing sensitive information to hackers through fake links that imitate legitimate ones. We've been looking at some examples ...

Read more

Simplicity, Reliability and Flexibility with Deployments

A majority of our customers--90%--use our patented inline mode for email security.

Read more

Classic Account Takeover via the Direct Deposit Change

One of the key capabilities of an email security solution is the ability to detect anomalies. When something happens that's out of the ordinary, it can be a sign tha...

Read more

URL-Based Phishing: The Fake Instagram

One of the biggest problems with online security is URL-based phishing. These attacks involve fake links that mimic legitimate ones, tricking users into entering sen...

Read more

Over Half of Malicious Files are HTML Attachments

Our research has revealed that credential harvesting remains the top attack vector, responsible for 59% of attacks. This malicious tactic also plays a significant ro...

Read more

Using Legitimate PDFs for BEC 3.0 Attacks

Soda PDF is a popular PDF editing tool. It allows for the easy editing of PDFs–which is not always an easy thing to do–as well as various features like conversion to...

Read more

Forrester Names Check Point a Leader in Enterprise Email Security Wave

We're proud to be named a Leader in The Forrester Wave™: Enterprise Email Security, Q2 2023 report. Harmony Email & Collaboration (HEC) received the highest scor...

Read more

Botswana Power Corporation Secured Users and Devices with HEC

Botswana Power Corporation (BPC) struggled with protecting its operation and strategic infrastructure as email became the prevalent attack vector. Their needs requir...

Read more

Introduction to AI/ML in Everyday Life: How it Works and What's Needed

Mark Ostrowski is Head of Engineering, US East, Check Point. He has 20 years’ experience in IT security and has helped design and support some of the largest securit...

Read more

AESI Found Peace of Mind with HEC

AESI is a consulting service to electric utility generation, transmission, distribution, and independent system operators. After testing their email security effecti...

Read more

How Lightbeam Health Improved Email Security Health

Lightbeam Health solutions help unify claims and clinical data to healthcare solutions.

Read more

Here's How GIMV was Able to Set and Forget Its Email Security

GIMV secures critical investment data for many financial services. However, their challenge to protect their cloud IT strategies and manage an ever-changing landscap...

Read more

Solving the BEC Problem with HEC

Ayesa is a technology solution to assist engineering, technology, and consulting agencies. After facing multiple sophisticated threats to their cloud-based platforms...

Read more

Aalborg Kommune Turned to HEC for Easy to Use Security

Aalborg Kommune wanted a solution providing consistent email security covering Microsoft 365 and cloud-based platforms. However, to relieve the burden from their sup...

Read more

How Midwest Rubber Reduced Their IT Team's Alert Fatigue

A large manufacturing company, Midwest Rubber, needed to protect their company from malware, phishing, and malicious attacks while simplifying management complexity....

Read more

The Picture in Picture Attack

Successful hacks rarely spell out what’s about to happen.

Read more

Post-Delivery Email Threats Create Havoc for the SOC

When it comes to spear-phishing, the force a threat actor takes to impact its victim can produce equal (if not greater) damage, and one way of doing so is using the ...

Read more

Zero-Click Attacks: Why Prevention, Not Remediation is Essential for Full Security

We've talked a lot about the Zero-Click attack that was recently propagated on Outlook. It allows for a damaging attack that steals NTLM hashes (the form in which Wi...

Read more

What Makes Good AI? We Asked ChatGPT

ChatGPT doesn't actually "know" anything (it's a statistical program), but if it's going to have a sentient sense of anything, it's probably going to be about AI its...

Read more

Canal Bank Solved Their Phishing Problem With an Easy To Implement System

Canal Bank helps protect Panama's commercial clients. With sensitive data to protect, Canal Bank needed a solution to defend its Office 365 users from malware, phish...

Read more

Leveraging Dropbox to Soar Into Inbox

Email threats continue to increase. In the first half of 2022, according to Check Point Research, email-delivered attacks reached 89% of all in-the-wild attacks.

Read more

How HEC Drastically Improved Regina Miracle's Ability to Block Attacks

Regina Miracle is a leading intimate wear, sportswear, and personal protective equipment manufacturer. After failed attempts from Microsoft to protect their Office 3...

Read more

Delivering Outstanding Protection and Performance for Quectel

Quectel is a global IoT solution based in Shanghai and has faced increasing risks for cyber-attacks, with ransomware being the primary weapon. Needing a comprehensiv...

Read more

How We Use AI to Find Anomalous Logins by Compromised Accounts

One of our key features for blocking compromised accounts is our auto-blocking feature.

Read more

Is Your Artificial Intelligence Actually Human?

There is an AI arms race in all industries, and nowhere is that more apparent than in email security.

Read more

Gaining Visibility to Microsoft Detections

Organizations know that today’s email threats mandate layered security and require the deployment of another email security solution on top of Microsoft’s, whether i...

Read more

Creating Malicious Content Hosted on Squarespace

We have been tracking the next wave of Business Email Compromise attacks. It relies on the use of legitimate services to unleash attacks. There’s nothing fake or spo...

Read more

Creating DLP Policies That Fit Your Organization

Data loss prevention is a key part of any email security solution. Preventing sensitive data from getting into the wrong hands is an essential part of what we do.

Read more

The Fake Firefighter PayPal Scam

We've written extensively about the tremendous wave of attacks that are being originated from PayPal.

Read more

Phishing Links via Linktree

UPDATE, 5/2/23: On Tuesday, 5/2/23, Avanan researchers and members of Linktree’s security and trust team spoke via video conference. The two companies spoke in more ...

Read more

Zelle Phishing

Zelle, the widely used and highly acclaimed money-transfer service, is now a prime target for cybercriminals. The simplicity of sending funds to friends or businesse...

Read more

Phishing From QuickBooks

The new wave of phishing that we’ve talked a lot about is BEC 3.0. Essentially, it’s the ability for hackers to sign up for a free account somewhere, send out an inv...

Read more

Taking Action on Anomalous Behavior

One of the key tenants of email security is detecting anomalies. When something happens that's out of the ordinary, it can be a sign that malicious behavior is afoot...

Read more

The Importance of Integrated Email Security

We’ve redefined email security a number of times.

Read more

The Problem with Blinding Default Security

Customers that use gateways like Mimecast, Proofpoint, Barracuda and IronPort might be susceptible to email attacks that other Office 365 and Gmail customers are not...

Read more

The Replier Attack

Email messages aren’t always what they seem. We talk often about how hackers obfuscate text and code within messages. That can be an effective way to bypass security...

Read more

Playing Email Whack-a-Mole

Ever feel like you're playing whack-a-mole when it comes to your email security? Ever feel like you're Bill Murray chasing after that gopher?

Read more

Leaders Lead

Avanan started in 2015 with a simple premise, that securing email in the cloud required a new approach. We did that with our patented solution, securing Microsoft 36...

Read more

Gateways and the Internal Attack

Proofpoint ,Mimecast, Barracuda and IronPort are traditional email security gateways that redirect traffic through a cloud-based proxy before it reaches the email se...

Read more

Zero-Click Attack: The Terminal Blow to Post-Delivery Email Security

The Check Point and Avanan ethos has always been Prevention First. We've explained to customers the importance of blocking attacks before an end-user has a chance to...

Read more

Why an API Deployment is Superior to Gateways

The majority of companies still use legacy gateways to protect their email. More and more, however, companies, are realizing the limitations of this approach, was or...

Read more

The Fundamentals of Good Email Security

Before email services like Office 365 and Gmail became popular, gateway architecture was the only deployment model for email security. Unfortunately, it is just not ...

Read more

The Triplet Trends of Cybersecurity

Let’s be honest. From being a noun or a verb to describing social media or fashion, “what’s trending” is a term gaining steam. However, whether the trend is popular,...

Read more

The Microsoft Reply Attack

One of the most spoofed brands in phishing attacks is Microsoft.

Read more

Avanan Customers Protected Against Novel Attack On Microsoft 365 (CVE-2023-23397)

Avanan customers are protected against a new vulnerability, CVE-2023-23397.

Read more

How is Your Email Security Stopping BEC?

Business Email Compromise (BEC) attacks have overwhelmed traditional email security providers because they don’t rely on URLs or malicious attachments to compromise ...

Read more

How Are Your Vendors Quarantining a Compromised Account?

Email gateways were designed to scan and block inbound messages. Their visibility and enforcement is limited to just email. They are unable to take action against an...

Read more

Are You Blocking Insider Attacks Before the Inbox?

According to Gartner, only 7% of organizations inspect their internal email. This is despite the fact that the last five years have seen a rise in internal threat ac...

Read more

Why Do SEGs Disable Microsoft or Google Security?

Both Microsoft 365 and G-Suite include their own email filters for spam, phishing and malware. When you deploy an external email gateway, however, you must put them ...

Read more

Have You Seen These Phishing Attacks? If So, Beware

We see phishing campaigns all the time--dedicated, long-standing attempts to hit end-users.

Read more

The Cloud Storage Re-Up Attack

Hackers always try to prey on end-users’ fear, uncertainty, and doubt. It’s all about tricking end-users into doing something they don’t want to do–namely, handing o...

Read more

How is Your SOC Handling Phishing?

Do you have a handle on how your SOC is handling phishing? More specifically, do you know how they are responding to end-user requests to restore messages and report...

Read more

How Does Ransomware Spread?

Ransomware. The word is enough to send shivers down any IT professional's spine.

Read more

CISOs Grow Increasingly Concerned About Email Security

The state of email security is a growing concern among IT and security decision-makers.

Read more

Why Do Governments Get Hacked So Often?

Governments are among the most attacked industries in the world. Why? Because they hold incredible amounts of data. That data is gold for hackers.

Read more

URL-Based Phishing On the Rise

Traditional phishing emails have followed the same set-up for decades – a malicious attachment or URL embedded in the email.

Read more

BEC 3.0 - Legitimate Sites for Illegitimate Purposes 

Security services have a problem and it’s called BEC 3.0.

Read more

Beware of the Microsoft Voice Scam

Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers.

Read more

The Used Car Salesperson of Email Security

We have all had the unpleasant experience of dealing with a used car salesperson. We all know the drill. They try to strongarm you with multiple different tactics th...

Read more

Phishing Remains the Key Vector

An individual’s inbox is a mixture of personal and professional information that many organizations feel is safe with complex passwords and security questions.

Read more

BEC 2.0 - Conversation Hijacking Exploits Accounting Teams into Payment Remittance  

One of the most financially devastating attacks is Business Email Compromise (BEC). In 2021, the FBI found that BEC-related complaints added up to $2.4 billion. For ...

Read more

Business Email Compromise Scam Leads to Credential Harvesting Evernote Page

Business Email Compromise attacks are one of the fastest-growing and most difficult-to-stop attacks in the cybersecurity space. There are a number of variants, but i...

Read more

PhishPal: How PayPal Became a Hackers’ Haven

In July of last year, we wrote about a new campaign where hackers are sending phishing emails and malicious invoices directly from PayPal.

Read more

URL Protection is an Essential Part of Email Security

According to a new report featured in ITWire, URL-based dominance is a growing trend over phishing attachments and 4x more likely to reach users, particularly high-p...

Read more

Using Geotargeting to Customize Phishing

In a global marketplace, the ability to geotarget is huge.

Read more

Leveraging ClickFunnels to Bypass Security Services

ClickFunnels is an online service that helps entrepreneurs and small businesses generate leads, build marketing engines and grow their businesses.

Read more

Hackers Dangling Fake Job Offers to Students

It can be tough being a student. Between the cost of tuition, room and board, and just daily life, it gets expensive very quickly.

Read more

How the Microsoft Outage Affects Email Security

Earlier, an outage hit Microsoft Office, causing disruption and delays across the business world.

Read more

Take Three Minutes. Secure Your Email Forever

Do you have three minutes? Of course you do. So in three minutes, you can set up Avanan (Harmony Email & Collaboration), and get robust, inline protection for yo...

Read more

The Blank Image Attack

A few years ago, we wrote about the MetaMorph attack. In this attack, the malicious HTML attachments use meta refresh to redirect the end-user from an HTML attachmen...

Read more

Malicious Files Delivered Through Cloud Apps Increasing

A new report found that OneDrive represents 30% of all cloud malware downloads. That's significantly higher than most other cloud apps. This represents a nearly thre...

Read more

Continuing to Use Microsoft Voice to Send Phishing Links

A few months ago, we wrote about how hackers are utilizing Microsoft’s Dynamics 365 Customer Voice platform to send phishing links. In general, the attack works by s...

Read more

Facebook Termination Notices Leads to Phishing

Last year, we wrote about a number of different Facebook-inspired attacks. See here and here for examples.

Read more

The Millisecond Myth, Explained

Be wary of any next-gen, API-based email security provider when they use the term, “milliseconds”. This should be an automatic red-flag for which they must be able t...

Read more

Phishmas: USPS Off-Track

Tracking numbers are the lifeblood of holiday shipping emails. Most emails you'll get from delivery services are tracking numbers. And if you're like some people, in...

Read more

Phishmas: The Failed Delivery

There are few things more frustrating than getting a notification that a package couldn't be delivered. It requires far too much work to get it back on track. But wh...

Read more

Phishmas: Is Your Address Correct?

We've all gotten some variant of this email before, even legitimate ones. A package can't be delivered. Maybe they couldn't get access to a building; maybe the addre...

Read more

Avanan Featured in G2's Best of Lists

The new series of G2 badges are out, and once again, we are thrilled and floored by the number of badges we've received. Thanks to our amazing customers, we're at th...

Read more

Phishmas: Delivering Malware

By now, you've got a sense of the type of Phishmas emails you may expect this holiday season. Shipping errors. Delivery fails. Tracking number mishaps. It's a verita...

Read more

What is Phishing Protection?

Phishing attacks, a major threat to corporate and personal cybersecurity, can deliver malware and steal sensitive data or money from an organization. Phishing protec...

Read more

The Automatic Forwarding Problem

We talk a lot about the limitations that come with API-based email security solutions. These detect and remediate solutions wait for an email to come into the inbox ...

Read more

Phishmas: The FedEx Sender Spoof

This Phishmas, be sure you know how to spot all the signs of a bad email.

Read more

Phishmas: The Direct Deposit Grinch

In our Phishmas series, we've written a lot about Direct Deposit scams. These are common scams, and we've seen more of them over the course of the holidays. We belie...

Read more

Balancing Productivity and Security: Handling Password-Protected Attachments

For years, password-protected attachments have been a sore spot for email security services. Until we can reliably break encryption, you can't scan the password-prot...

Read more

Phishmas: The USPS Amazon Switcharoo

This Phishmas, we're going to be ordering a ton of things from Amazon.

Read more

Celebrating 1 Year Since Check Point's Acquisition of Avanan

In August 2021, Check Point acquired Avanan. Now, it's been over a year later and things are going great.

Read more

11 Types of Social Engineering Attacks

Using deception and manipulation, social engineering attacks induce the target into doing something that an attacker wants. The social engineer may use trickery, coe...

Read more

Introducing Archiving

Avanan now offers archiving, allowing customers to store emails for a period of seven years, as well as filter through emails to find relevant ones and export them.

Read more

Phishmas: Direct Deposit Scams, Continued

Earlier this week, in our Phishmas series, we discussed the influx we're seeing in Direct Deposit scams. Essentially, a hacker impersonates an employee and asks HR t...

Read more

Phishmas: USPS Delivery Status

This Phishmas, we expect to check delivery companies for package and delivery status.

Read more

Phishmas: The Verification Email

During Phishmas, you can expect a large increase of phishing emails from shipping companies like UPS, DHL and FedEx. End-users receive tons of legitimate emails from...

Read more

What is Email Scanning?

Email is one of the most widely used forms of corporate communication, but it is also a common cyberattack vector. Phishing attacks are a common means for attackers ...

Read more

Phishmas: Direct Deposit Scam

In our first example of Phishmas scams, we'll talk about Direct Deposit fraud.

Read more

It's Beginning to Look a Lot Like Phishmas

Phishes roasting in an open email...malware nipping at your nose. It's Phishmas and all the hackers are stirring--even your mouse!

Read more

Amazon Scams Targeting Japanese Companies

In the third quarter of this year, Asia experienced the most cyberattacks of all regions in the world, according to Check Point Research, with an average of 1,778 we...

Read more

World Cup Starts...And So Does World Cup Phishing

The World Cup is underway, with wall-to-wall soccer on tap for the next month.

Read more

New Attack Showcases Importance of Full-Suite Security

Researchers have uncovered a state-sponsored hacking campaign that uses Google accounts to send emails, and then uses a Google Drive or Dropbox folder as the mechani...

Read more

The Different Types of Ransomware

Ransomware is a top-of-mind security concern for many organizations. However, not all ransomware attacks are the same. A number of different ransomware variants are ...

Read more

Emotet Malware

Emotet is a sophisticated, self propagating Trojan . While Emotet began as a banking trojan, its modular design has allowed it to evolve into a distributor for other...

Read more

Black Friday Scams Are Beginning

It’s the most wonderful time of year. Family. Post-turkey malaise. Shopping. Phishing scams.

Read more

How Should Companies Handle Ransomware?

In 2021, high-profile ransomware attacks, such as the Colonial Pipeline and Kaseya hacks, caused significant disruptions to supply chains and companies’ operations.

Read more

Avanan Named a Tech Innovator in Email Security By CRN

Avanan is proud to receive the 2022 Tech Innovator Award in Email Security from CRN.

Read more

Avanan Recieves 5-Star Rating from Expert Insights

Avanan received a 5-star review from Expert Insights.

Read more

Let Avanan's Email Experts Give You Time Back

Avanan's Incident Response-as-a-Service (IRaaS) uses our team of highly-trained, Tier 2 security analyst experts to review end-user requests to release emails from q...

Read more

How Hackers Target Nations

According to Check Point research, the second-most targeted industry in the world is the government sector. In the third quarter of this year, governments were on th...

Read more

Human-Operated Ransomware

Ransomware has emerged as a dominant cyber threat and one of the most expensive types of cyberattacks that an organization can fall victim to. However, not all ranso...

Read more

The Millisecond Myth, Exposed

By now, the differences between Avanan and other API-based solutions are clear:

Read more

Abusing Microsoft Customer Voice to Send Phishing Links

Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers.

Read more

What is a Vishing Attack?

Vishing – a portmanteau of voice and phishing – attacks are performed over the phone, and are considered a type of a social engineering attack, as they use psycholog...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial