Dylan Press

Dylan Press



4-Reasons-Microsoft-Safe-Links-Make-Office-365-Less-Safe-Featured

5 Reasons Microsoft Safe Links Make Office 365 Less Safe

Since the first successful phishing attack, we have trained our email users to read every URL before clicking. Microsoft’s Advanced Threat Protection (ATP) included ...

Read more

Weaponizing-Google-Featured

How G Suite Is Weaponized by Hackers in 2019

Google's G Suite brings much needed convenience and organization to the enterprise cloud. Because of its popularity, however, it is a favorite target for hackers. 

Read more

Global-Phish-Report-blog

2019 Avanan Global Phish Report

To create the 2019 Global Phish Report, Avanan security scientists analyzed 55.5 million emails to surface key insights on how hackers target Office 365 and Gmail.

Read more

Blog Post2FWebinar Images (87)

Fake Email Invoices: Why Office 365 Keeps Missing These Phishing Attacks?

Emails with fake invoices has been one of the most popular attack vectors against Office 365 email users for the past several years. The malicious emails are disguis...

Read more

Blog Post2FWebinar Images (84)

ACE Archives: Microsoft finally closes hole that allowed trojans to bypass Office 365 default security

For several weeks, we detected (and blocked) an attack targeting one of the largest municipalities in the U.S. that bypassed Office 365 default security, using a sim...

Read more

Blog Post2FWebinar Images (76)

Throwback Thursday: The DNC email hacks by Russian hacking firms

In 2016, we wrote a blog post and hosted a webinar summarizing the Russian hacks against the DNC. Two years later, Mueller's indictments have have both confirmed the...

Read more

What is a CASB infographic

What is a Cloud Access Security Broker (CASB)? | Infographic

Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats. What does a CASB do? Gartner ...

Read more

Blog Post2FWebinar Images (72)

4 Major Ways Phishing Attacks Have Evolved In The Last Ten Years

Ten years is an eternity when it comes to technology. Back in 2008, the Motorola Razor was the most popular cellphone on the market and Blu-Ray was set to be the fut...

Read more

cost-of-ransomware

The Cost of Ransomware Prevention vs Recovery in 2019

Like any business decision, handling ransomware needs to be approached with ROI in mind. Is it better to invest in ransomware-preventing technology, or is the risk s...

Read more

Blog Post2FWebinar Images (52)

Cloud Security Glossary

As if "the cloud" weren't vague enough of a concept in itself, the vocabulary describing cloud security can be equally as elusive. At Avanan, we believe that cloud s...

Read more

10MythsAccountTakeover-Featured

9 Myths of Account Takeover

Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly disco...

Read more

anti-phishing-justification featured

Four Justifications for Anti-Phishing Budgets

When people think of phishing attacks, what often comes to mind is a Nigerian Prince asking for a bank transfer. As long as employees are savvy, the risk seems quite...

Read more

mailsploit-featured.png

Why Mailsploit Is One of the Most Dangerous New Phishing Schemes

Avanan has been catching multiple attacks against its customers using a new phishing method called Mailsploit. We have observed this attack on both Office 365 and Gm...

Read more

Attack Report: Phishing Your HR Platform in the Cloud

Avanan’s security analysts recently tracked an increased number of attacks against cloud-based HR systems such as ADP, Workday, Zenefits and Justworks, to compromise...

Read more

VerizonDataBreachInvestigationsReport.png

Verizon's 2017 Data Breach Investigations Report: Malware and Phishing

Earlier this month, Verizon released their 10th annual Data Breach Investigations Report. The 76-page report covers the data breach trends across all industries—from...

Read more

Attack Report: Office 365 Sharepoint from China

This attack report covers a massive attack on Office 365 users that leverages the trust Office 365 puts in its own links. 

Read more

Blog Post2FWebinar Images (2).png

5 Phishing Attacks Office 365 and Gmail Didn't Detect in July

In the past 30 days, the Avanan platform has detected and blocked thousands of unique phishing attacks against our customers. The most interesting are those that byp...

Read more

450421681.jpg

Gmail Phishing Attack: How to Identify a Phishing Email in Gmail

Gmail Phishing is the most popular way for attackers to gain access to your Google Cloud. It can be difficult to keep up with all the methods for detecting phishing ...

Read more

anti-casb linkedin ad.png

What's Wrong with CASBs?

CASB vendors have been around for the past 5-7 years, VCs have invested over $500M into these companies and Gartner has been promoting them with very bullish growth ...

Read more

Untitled presentation (1).png

NHS Hit by International Ransomware Attack

May 12th, 2017 The NHS has been hit by a ransomware attack today, affecting at least 16 of their trusts in the UK according to The Guardian. This is a widespread att...

Read more

1 2
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial