Dylan Press

Dylan Press



How likely is each presidential candidate to be used as bait in a phishing campaign? We found out.

Avanan doesn’t conduct polls and has no deeper insight into who will win the US presidency in 2020 than anyone else, but we do have a lot of data on phishing emails....

Read more

5-Things-Everyone-Should-Know-About-the-2016-DNC-Email-Breach

5 Things Security Professionals Should Know About the DNC Email Breach

As we enter the 2020 election season, we are once again discussing the possibility of foreign intervention, which puts the 2016 hack of the Democratic National Commi...

Read more

4-Reasons-Microsoft-Safe-Links-Make-Office-365-Less-Safe-Featured

Safe Links | Why Is This Microsoft Office 365 Safe Link Not Safe?

Since the first successful phishing attack, we have trained our email users to read every URL before clicking. Microsoft’s Advanced Threat Protection (ATP) included ...

Read more

Weaponizing-Google-Featured

How Can A Google Drive Account Be Weaponized By Hackers?

Google's G Suite brings much-needed convenience and organization to the enterprise cloud. But, can a Google Drive account be hacked? Because of its popularity, it is...

Read more

Blog Post2FWebinar Images (87)

Fake Email Invoices: Why Office 365 Keeps Missing These Phishing Attacks?

Emails with fake invoices has been one of the most popular attack vectors against Office 365 email users for the past several years. The malicious emails are disguis...

Read more

Blog Post2FWebinar Images (84)

ACE Archives: Microsoft finally closes hole that allowed trojans to bypass Office 365 default security

For several weeks, we detected (and blocked) an attack targeting one of the largest municipalities in the U.S. that bypassed Office 365 default security, using a sim...

Read more

Blog Post2FWebinar Images (76)

Throwback Thursday: The DNC email hacks by Russian hacking firms

In 2016, we wrote a blog post and hosted a webinar summarizing the Russian hacks against the DNC. Two years later, Mueller's indictments have have both confirmed the...

Read more

Blog Post2FWebinar Images (72)

4 Major Ways Phishing Attacks Have Evolved In The Last Ten Years

Ten years is an eternity when it comes to technology. Back in 2008, the Motorola Razor was the most popular cellphone on the market and Blu-Ray was set to be the fut...

Read more

cost-of-ransomware

The Cost of Ransomware Prevention vs Recovery in 2019

Like any business decision, handling ransomware needs to be approached with ROI in mind. Is it better to invest in ransomware-preventing technology, or is the risk s...

Read more

Blog Post2FWebinar Images (52)

Cloud Security Glossary

As if "the cloud" weren't vague enough of a concept in itself, the vocabulary describing cloud security can be equally as elusive. At Avanan, we believe that cloud s...

Read more

10MythsAccountTakeover-Featured

9 Myths of Account Takeover

Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly disco...

Read more

anti-phishing-justification featured

Four Justifications for Anti-Phishing Budgets

When people think of phishing attacks, what often comes to mind is a Nigerian Prince asking for a bank transfer. As long as employees are savvy, the risk seems quite...

Read more

mailsploit-featured.png

Why Mailsploit Is One of the Most Dangerous New Phishing Schemes

Avanan has been catching multiple attacks against its customers using a new phishing method called Mailsploit. We have observed this attack on both Office 365 and Gm...

Read more

Attack Report: Phishing Your HR Platform in the Cloud

Avanan’s security analysts recently tracked an increased number of attacks against cloud-based HR systems such as ADP, Workday, Zenefits and Justworks, to compromise...

Read more

VerizonDataBreachInvestigationsReport.png

Verizon's 2017 Data Breach Investigations Report: Malware and Phishing

Earlier this month, Verizon released their 10th annual Data Breach Investigations Report. The 76-page report covers the data breach trends across all industries—from...

Read more

Attack Report: Office 365 Sharepoint from China

This attack report covers a massive attack on Office 365 users that leverages the trust Office 365 puts in its own links. 

Read more

Blog Post2FWebinar Images (2).png

5 Phishing Attacks Office 365 and Gmail Didn't Detect in July

In the past 30 days, the Avanan platform has detected and blocked thousands of unique phishing attacks against our customers. The most interesting are those that byp...

Read more

450421681.jpg

Gmail Phishing Attack: How to Identify a Phishing Email in Gmail

Gmail Phishing is the most popular way for attackers to gain access to your Google Cloud. It can be difficult to keep up with all the methods for detecting phishing ...

Read more

Untitled presentation (1).png

NHS Hit by International Ransomware Attack

May 12th, 2017 The NHS has been hit by a ransomware attack today, affecting at least 16 of their trusts in the UK according to The Guardian. This is a widespread att...

Read more

Untitled presentation-1.png

Jaff: New Ransomware Attack Blasting 5 Million Emails Per Hour

WannaCry infected over 200,000 computers in 150 countries. The large-scale ransomware attack infected a large number of global companies such as FedEx, LATAM airline...

Read more

1
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial