Jeremy Fuchs

Jeremy Fuchs



Hijacking Student Accounts to Launch BEC-Style Attacks

Business Email Compromise (BEC) attacks are some of the most popular and devastating attacks out there. They work, broadly, by sending an email from a spoofed or leg...

Read more

Hackers Shifting Their Messages

A new study from KnowBe4 has quantified which phishing subject lines and links are the most likely to be clicked.

Read more

Incident Responders Have it Rough

A new survey by IBM confirms what many in the incident response field know all too well--it's an incredibly difficult job.

Read more

Video: The Google Translate Attack

Earlier today, we published an attack brief on how scammers are leveraging the name of Google Translate to get into the inbox. It's a social engineering scam that la...

Read more

Spoofing Google Translate to Steal Credentials

Popular sites convey legitimacy to the end user. A user is more likely to click on something that looks like Google than something they’ve never seen before.

Read more

Link Re-Writing Inside Attachments

Scanning a link in the body of an email list an essential part of any security solution, though not everybody can do it. It's important because links that appear fin...

Read more

Ransomware Tops Companies' Concerns

A new report from SonicWall found that ransomware is the biggest concern of most customers. A whopping 91% said it was their biggest concern. Phishing (76%) and encr...

Read more

Secure Handling of Password-Protected Attachments

Password-protected attachments can be inspected, even if the email does not contain their passwords. Many phishing attacks include password-protected attachments as ...

Read more

URL Emulation Behind Links for Better Security

Avanan's Click-Time Protection emulates websites behind links, to detect elusive zero-day phishing websites.  

Read more

Evaluating Microsoft and Other Email Security Services

Microsoft is the most popular email service in the world. 

Read more

What is Content Disarm and Reconstruction (CDR)?

Content disarm and reconstruction (CDR), also known as Threat Extraction, proactively protects against known and unknown threats contained in documents by removing e...

Read more

What Is Sandboxing?

Sandboxing is a cybersecurity practice where you run code, observe and analyze and code in a safe, isolated environment on a network that mimics end-user operating e...

Read more

How Should Companies Handle Ransomware?

In 2021, high-profile ransomware attacks, such as the Colonial Pipeline and Kaseya hacks, caused significant disruptions to supply chains and companies’ operations.

Read more

Continuing to Leverage Facebook Ads to Send Credential Harvesting Links

A few weeks ago, we wrote about how threat actors are using the Facebook Ad Manager to send credential harvesting links.

Read more

Top 3 Office 365 Security Concerns

Microsoft’s Office 365 is one of the most commonly used platforms of cloud-based applications. Globally, Office 365 is used by around 38% of companies, a number that...

Read more

What is Cloud DLP (Data Loss Prevention)?

Data loss prevention (DLP) solutions are essential to protect the sensitive information of an organization and its customers. DLP solutions are designed to monitor d...

Read more

Phishing in the Sky

Recently, Americans Airlines stated that the personal information of a “very small number” of employees and customers was affected by an unauthorized party’s comprom...

Read more

Avanan Featured in G2's Best Of Lists...Again

Every season, G2 comes out with badges for their Best Of Lists. And every season, we humbled and blown away by the amount of positive reviews and badges we receive. ...

Read more

Avanan Named to Channel Futures Top 20 List of Email Security Providers

Channel Futures published a list of the top 20 email security providers and Avanan is proud to be on the list. 

Read more

The Auto Delete Attack

A successful credential harvesting scam can have devastating consequences.

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial