Dylan Press

Dylan Press



4-Reasons-Microsoft-Safe-Links-Make-Office-365-Less-Safe-Featured

5 Reasons Microsoft Safe Links Make Office 365 Less Safe

Since the first successful phishing attack, we have trained our email users to read every URL before clicking. Microsoft’s Advanced Threat Protection (ATP) included ...

Read more

Weaponizing-Google-Featured

How G Suite Is Weaponized by Hackers in 2019

Google's G Suite brings much needed convenience and organization to the enterprise cloud. Because of its popularity, however, it is a favorite target for hackers. 

Read more

Global-Phish-Report-blog

2019 Avanan Global Phish Report

To create the 2019 Global Phish Report, Avanan security scientists analyzed 55.5 million emails to surface key insights on how hackers target Office 365 and Gmail.

Read more

Blog Post2FWebinar Images (87)

Fake Email Invoices: Why Office 365 Keeps Missing These Phishing Attacks?

Emails with fake invoices has been one of the most popular attack vectors against Office 365 email users for the past several years. The malicious emails are disguis...

Read more

Blog Post2FWebinar Images (84)

ACE Archives: Microsoft finally closes hole that allowed trojans to bypass Office 365 default security

For several weeks, we detected (and blocked) an attack targeting one of the largest municipalities in the U.S. that bypassed Office 365 default security, using a sim...

Read more

Blog Post2FWebinar Images (76)

Throwback Thursday: The DNC email hacks by Russian hacking firms

In 2016, we wrote a blog post and hosted a webinar summarizing the Russian hacks against the DNC. Two years later, Mueller's indictments have have both confirmed the...

Read more

Blog Post2FWebinar Images (72)

4 Major Ways Phishing Attacks Have Evolved In The Last Ten Years

Ten years is an eternity when it comes to technology. Back in 2008, the Motorola Razor was the most popular cellphone on the market and Blu-Ray was set to be the fut...

Read more

cost-of-ransomware

The Cost of Ransomware Prevention vs Recovery in 2019

Like any business decision, handling ransomware needs to be approached with ROI in mind. Is it better to invest in ransomware-preventing technology, or is the risk s...

Read more

Blog Post2FWebinar Images (52)

Cloud Security Glossary

As if "the cloud" weren't vague enough of a concept in itself, the vocabulary describing cloud security can be equally as elusive. At Avanan, we believe that cloud s...

Read more

10MythsAccountTakeover-Featured

9 Myths of Account Takeover

Account Takeover Attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly disco...

Read more

anti-phishing-justification featured

Four Justifications for Anti-Phishing Budgets

When people think of phishing attacks, what often comes to mind is a Nigerian Prince asking for a bank transfer. As long as employees are savvy, the risk seems quite...

Read more

mailsploit-featured.png

Why Mailsploit Is One of the Most Dangerous New Phishing Schemes

Avanan has been catching multiple attacks against its customers using a new phishing method called Mailsploit. We have observed this attack on both Office 365 and Gm...

Read more

Attack Report: Phishing Your HR Platform in the Cloud

Avanan’s security analysts recently tracked an increased number of attacks against cloud-based HR systems such as ADP, Workday, Zenefits and Justworks, to compromise...

Read more

VerizonDataBreachInvestigationsReport.png

Verizon's 2017 Data Breach Investigations Report: Malware and Phishing

Earlier this month, Verizon released their 10th annual Data Breach Investigations Report. The 76-page report covers the data breach trends across all industries—from...

Read more

Attack Report: Office 365 Sharepoint from China

This attack report covers a massive attack on Office 365 users that leverages the trust Office 365 puts in its own links. 

Read more

1 2
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial