A new form of malware is reportedly being deployed by Russia against Ukraine.
A new form of malware is reportedly being deployed by Russia against Ukraine.
When you think of phishing, you think of email.
For decades, world leaders communicated via a secure line, the infamous red phone.
The 2022 Cyber Security Report uncovers the key cybersecurity trends from 2021, including a supply chain attack ‘frenzy’ and increased disruption to everyday life. E...
Robbie Elliott is Check Point's Head of Engineering, US West. A CISO recently asked this question:
In April 2021, Avanan researchers wrote about how hackers are using CAPTCHA forms–those annoying puzzles you have to fill out after entering data to prove you are hu...
Recently, our research team uncovered a staggering 8x increase in phishing attacks originating in Russia. We continue to monitor and analyze phishing attacks and mal...
Business Email Compromise is often touted as a dangerous form of phish. And it certainly is! After all, nobody likes to hear their VIPs got spoofed for get-rich-quic...
Hackers are constantly looking for ways to disguise their intentions. They not only have to craft phishing emails that not only bypass filters but are also believabl...
Phishing is the number one cause of breaches. It's also a major driver of ransomware. A new report confirms what we already knew. Of the 85% of organizations that ha...
Phishing is the number one cause of breaches today. From simple-seeming spoofs to complex, malware-driven scams, phishing is everywhere. It can be a huge cause of co...
SmartPhish, Avanan's AI algorithm that snuffs out phishing before it reaches the inbox, monitors over 300 different indicators. Another important tenet for protectio...
Looking at API/AI Enabled Email Security Vendors? You’ve made the decision to explore the next generation of email security and are looking at several different vend...
Starting on February 27th, Avanan has noticed an 8x increase in email-borne attacks originating from Russia.
Encryption functions are algorithms designed to render data unreadable to anyone that does not have the decryption key. Data encrypted with a strong encryption algor...
Gmail remains an incredibly popular email service, especially for small businesses. Attackers are not only targeting email but the entire Google Workspace, such as D...
Malicious emails are behind 90% of cyberattacks and deliver 75% of ransomware. These phishing emails are designed to trick or manipulate employees into clicking on a...
There are two types of API-based email security solutions. One provides real security. The other is a knockoff. Let's explain:
Have you heard that fabled water-faucet analogy?
What does protection against the most virulent threats today look like? There are tons of measures to take to keep your organization secure. But incorporating these ...